Owners Manual
Influencing RSTP Root Selection......................................................................................................791
Configuring an EdgePort.................................................................................................................. 791
Configuring Fast Hellos for Link State Detection............................................................................ 792
46 Software-Defined Networking (SDN)........................................................ 794
47 Security............................................................................................................ 795
AAA Accounting................................................................................................................................ 795
Configuration Task List for AAA Accounting..............................................................................795
AAA Authentication........................................................................................................................... 797
Configuration Task List for AAA Authentication........................................................................ 798
AAA Authorization............................................................................................................................ 800
Privilege Levels Overview...........................................................................................................800
Configuration Task List for Privilege Levels............................................................................... 801
RADIUS..............................................................................................................................................806
RADIUS Authentication...............................................................................................................806
Configuration Task List for RADIUS........................................................................................... 807
TACACS+...........................................................................................................................................810
Configuration Task List for TACACS+........................................................................................ 810
TACACS+ Remote Authentication..............................................................................................812
Command Authorization............................................................................................................ 813
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................813
Enabling SCP and SSH...................................................................................................................... 814
Using SCP with SSH to Copy a Software Image........................................................................ 815
Removing the RSA Host Keys and Zeroizing Storage ...............................................................816
Configuring When to Re-generate an SSH Key ........................................................................816
Configuring the SSH Server Key Exchange Algorithm...............................................................816
Configuring the HMAC Algorithm for the SSH Server............................................................... 817
Configuring the SSH Server Cipher List......................................................................................818
Secure Shell Authentication........................................................................................................818
Troubleshooting SSH.................................................................................................................. 821
Telnet.................................................................................................................................................821
VTY Line and Access-Class Configuration...................................................................................... 822
VTY Line Local Authentication and Authorization.....................................................................822
VTY Line Remote Authentication and Authorization.................................................................823
VTY MAC-SA Filter Support........................................................................................................ 823
Role-Based Access Control............................................................................................................. 824
Overview of RBAC.......................................................................................................................824
User Roles....................................................................................................................................827
AAA Authentication and Authorization for Roles....................................................................... 831
Role Accounting......................................................................................................................... 834
Display Information About User Roles.......................................................................................835










