Concept Guide

Conguration Task List for AAA Accounting........................................................................................................806
RADIUS Accounting................................................................................................................................................ 808
AAA Authentication........................................................................................................................................................814
Conguration Task List for AAA Authentication................................................................................................... 814
Obscuring Passwords and Keys....................................................................................................................................817
AAA Authorization.......................................................................................................................................................... 817
Privilege Levels Overview........................................................................................................................................818
Conguration Task List for Privilege Levels...........................................................................................................818
RADIUS........................................................................................................................................................................... 823
RADIUS Authentication...........................................................................................................................................823
Conguration Task List for RADIUS.......................................................................................................................824
TACACS+........................................................................................................................................................................828
Conguration Task List for TACACS+................................................................................................................... 828
TACACS+ Remote Authentication.........................................................................................................................829
Command Authorization.........................................................................................................................................830
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................831
Enabling SCP and SSH.................................................................................................................................................. 831
Using SCP with SSH to Copy a Software Image................................................................................................ 832
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 833
Conguring When to Re-generate an SSH Key ..................................................................................................833
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 833
Conguring the HMAC Algorithm for the SSH Server.......................................................................................834
Conguring the HMAC Algorithm for the SSH Client.........................................................................................834
Conguring the SSH Server Cipher List...............................................................................................................835
Conguring the SSH Client Cipher List................................................................................................................ 836
Secure Shell Authentication................................................................................................................................... 836
Troubleshooting SSH...............................................................................................................................................839
Telnet...............................................................................................................................................................................839
VTY Line and Access-Class Conguration................................................................................................................. 839
VTY Line Local Authentication and Authorization............................................................................................... 839
VTY Line Remote Authentication and Authorization...........................................................................................840
VTY MAC-SA Filter Support.................................................................................................................................. 840
Support for Change of Authorization and Disconnect Messages packets............................................................. 841
Change of Authorization (CoA) packets............................................................................................................... 841
Disconnect Messages..............................................................................................................................................841
Attributes..................................................................................................................................................................842
Error-cause Values...................................................................................................................................................845
CoA Packet Processing.......................................................................................................................................... 845
CoA or DM Discard..................................................................................................................................................846
Disconnect Message Processing........................................................................................................................... 847
Conguring DAC...................................................................................................................................................... 847
Conguring the port number..................................................................................................................................847
Conguring shared key............................................................................................................................................847
Disconnecting administrative users logged in through RADIUS........................................................................ 848
Conguring CoA to bounce 802.1x enabled ports............................................................................................... 848
Contents
25