Reference Guide

47 Security.................................................................................................................798
AAA Accounting................................................................................................................................ 798
Configuration Task List for AAA Accounting..............................................................................798
AAA Authentication.......................................................................................................................... 800
Configuration Task List for AAA Authentication........................................................................ 801
AAA Authorization.............................................................................................................................803
Privilege Levels Overview........................................................................................................... 803
Configuration Task List for Privilege Levels...............................................................................804
RADIUS..............................................................................................................................................809
RADIUS Authentication............................................................................................................... 810
Configuration Task List for RADIUS............................................................................................810
TACACS+...........................................................................................................................................813
Configuration Task List for TACACS+........................................................................................ 813
TACACS+ Remote Authentication..............................................................................................815
Command Authorization............................................................................................................ 816
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 816
Enabling SCP and SSH.......................................................................................................................817
Using SCP with SSH to Copy a Software Image........................................................................ 818
Removing the RSA Host Keys and Zeroizing Storage ...............................................................819
Configuring When to Re-generate an SSH Key ........................................................................819
Configuring the SSH Server Key Exchange Algorithm...............................................................819
Configuring the HMAC Algorithm for the SSH Server...............................................................820
Configuring the SSH Server Cipher List......................................................................................821
Secure Shell Authentication........................................................................................................821
Troubleshooting SSH..................................................................................................................824
Telnet................................................................................................................................................ 824
VTY Line and Access-Class Configuration...................................................................................... 825
VTY Line Local Authentication and Authorization.....................................................................825
VTY Line Remote Authentication and Authorization.................................................................826
VTY MAC-SA Filter Support........................................................................................................ 826
Role-Based Access Control..............................................................................................................827
Overview of RBAC.......................................................................................................................827
User Roles................................................................................................................................... 830
AAA Authentication and Authorization for Roles.......................................................................834
Role Accounting..........................................................................................................................837
Display Information About User Roles.......................................................................................838
48 Service Provider Bridging................................................................................840
VLAN Stacking.................................................................................................................................. 840
Important Points to Remember..................................................................................................841
Configure VLAN Stacking........................................................................................................... 842