Concept Guide
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................785
Modifying Interface Parameters...................................................................................................................................785
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................785
Inuencing RSTP Root Selection.................................................................................................................................785
Conguring an EdgePort.............................................................................................................................................. 786
Conguring Fast Hellos for Link State Detection.......................................................................................................787
46 Software-Dened Networking (SDN)...................................................................................................... 788
47 Security................................................................................................................................................... 789
AAA Accounting.............................................................................................................................................................789
Conguration Task List for AAA Accounting........................................................................................................ 789
AAA Authentication........................................................................................................................................................791
Conguration Task List for AAA Authentication.................................................................................................. 792
Obscuring Passwords and Keys...................................................................................................................................795
AAA Authorization......................................................................................................................................................... 795
Privilege Levels Overview.......................................................................................................................................795
Conguration Task List for Privilege Levels..........................................................................................................796
RADIUS............................................................................................................................................................................801
RADIUS Authentication........................................................................................................................................... 801
Conguration Task List for RADIUS...................................................................................................................... 802
TACACS+........................................................................................................................................................................806
Conguration Task List for TACACS+...................................................................................................................806
TACACS+ Remote Authentication.........................................................................................................................807
Command Authorization.........................................................................................................................................808
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................809
Enabling SCP and SSH................................................................................................................................................. 809
Using SCP with SSH to Copy a Software Image................................................................................................. 810
Removing the RSA Host Keys and Zeroizing Storage .........................................................................................811
Conguring When to Re-generate an SSH Key ................................................................................................... 811
Conguring the SSH Server Key Exchange Algorithm.........................................................................................811
Conguring the HMAC Algorithm for the SSH Server........................................................................................812
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 812
Conguring the SSH Server Cipher List................................................................................................................813
Conguring the SSH Client Cipher List................................................................................................................. 814
Secure Shell Authentication.................................................................................................................................... 814
Troubleshooting SSH................................................................................................................................................817
Telnet................................................................................................................................................................................817
VTY Line and Access-Class Conguration.................................................................................................................. 817
VTY Line Local Authentication and Authorization................................................................................................ 817
VTY Line Remote Authentication and Authorization........................................................................................... 818
VTY MAC-SA Filter Support................................................................................................................................... 818
Support for Change of Authorization and Disconnect Messages packets.............................................................819
Change of Authorization (CoA) packets............................................................................................................... 819
Disconnect Messages..............................................................................................................................................819
Attributes..................................................................................................................................................................820
Contents
25










