Concept Guide
Inuencing RSTP Root Selection................................................................................................................................. 810
Conguring an EdgePort................................................................................................................................................811
Conguring Fast Hellos for Link State Detection....................................................................................................... 812
46 Software-Dened Networking (SDN).......................................................................................................813
47 Security....................................................................................................................................................814
AAA Accounting..............................................................................................................................................................814
Conguration Task List for AAA Accounting.........................................................................................................814
AAA Authentication........................................................................................................................................................816
Conguration Task List for AAA Authentication................................................................................................... 817
Obscuring Passwords and Keys...................................................................................................................................820
AAA Authorization......................................................................................................................................................... 820
Privilege Levels Overview.......................................................................................................................................820
Conguration Task List for Privilege Levels...........................................................................................................821
RADIUS........................................................................................................................................................................... 825
RADIUS Authentication...........................................................................................................................................825
Conguration Task List for RADIUS...................................................................................................................... 826
Support for Change of Authorization and Disconnect Messages packets...................................................... 830
TACACS+.........................................................................................................................................................................841
Conguration Task List for TACACS+....................................................................................................................841
TACACS+ Remote Authentication.........................................................................................................................843
Command Authorization.........................................................................................................................................844
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 844
Enabling SCP and SSH................................................................................................................................................. 844
Using SCP with SSH to Copy a Software Image................................................................................................ 845
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 846
Conguring When to Re-generate an SSH Key ..................................................................................................846
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 847
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 847
Conguring the HMAC Algorithm for the SSH Client.........................................................................................848
Conguring the SSH Server Cipher List...............................................................................................................848
Conguring the SSH Client Cipher List................................................................................................................ 849
Conguring DNS in the SSH Server..................................................................................................................... 849
Secure Shell Authentication...................................................................................................................................850
Troubleshooting SSH...............................................................................................................................................852
Telnet...............................................................................................................................................................................853
VTY Line and Access-Class Conguration................................................................................................................. 853
VTY Line Local Authentication and Authorization............................................................................................... 853
VTY Line Remote Authentication and Authorization...........................................................................................854
VTY MAC-SA Filter Support.................................................................................................................................. 854
Role-Based Access Control..........................................................................................................................................855
Overview of RBAC.................................................................................................................................................. 855
User Roles.................................................................................................................................................................857
AAA Authentication and Authorization for Roles................................................................................................. 861
Role Accounting.......................................................................................................................................................863
26
Contents










