Concept Guide
Modifying Interface Parameters................................................................................................................................... 817
Enabling SNMP Traps for Root Elections and Topology Changes............................................................................817
Inuencing RSTP Root Selection..................................................................................................................................817
Conguring an EdgePort............................................................................................................................................... 818
Conguring Fast Hellos for Link State Detection....................................................................................................... 819
46 Software-Dened Networking (SDN)...................................................................................................... 820
47 Security....................................................................................................................................................821
AAA Accounting..............................................................................................................................................................821
Conguration Task List for AAA Accounting.........................................................................................................821
RADIUS Accounting................................................................................................................................................ 823
AAA Authentication.......................................................................................................................................................829
Conguration Task List for AAA Authentication.................................................................................................. 829
Obscuring Passwords and Keys...................................................................................................................................832
AAA Authorization......................................................................................................................................................... 832
Privilege Levels Overview.......................................................................................................................................833
Conguration Task List for Privilege Levels..........................................................................................................833
RADIUS........................................................................................................................................................................... 837
RADIUS Authentication...........................................................................................................................................837
Conguration Task List for RADIUS...................................................................................................................... 839
Support for Change of Authorization and Disconnect Messages packets...................................................... 842
TACACS+........................................................................................................................................................................853
Conguration Task List for TACACS+...................................................................................................................853
TACACS+ Remote Authentication........................................................................................................................ 855
Command Authorization.........................................................................................................................................856
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................856
Enabling SCP and SSH................................................................................................................................................. 856
Using SCP with SSH to Copy a Software Image.................................................................................................857
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 858
Conguring When to Re-generate an SSH Key ..................................................................................................858
Conguring the SSH Server Key Exchange Algorithm.......................................................................................859
Conguring the HMAC Algorithm for the SSH Server.......................................................................................859
Conguring the HMAC Algorithm for the SSH Client........................................................................................ 860
Conguring the SSH Server Cipher List................................................................................................................861
Conguring the SSH Client Cipher List................................................................................................................. 861
Conguring DNS in the SSH Server..................................................................................................................... 862
Secure Shell Authentication................................................................................................................................... 862
Troubleshooting SSH...............................................................................................................................................865
Telnet...............................................................................................................................................................................865
VTY Line and Access-Class Conguration................................................................................................................. 865
VTY Line Local Authentication and Authorization...............................................................................................865
VTY Line Remote Authentication and Authorization.......................................................................................... 866
VTY MAC-SA Filter Support.................................................................................................................................. 866
Role-Based Access Control.......................................................................................................................................... 867
Overview of RBAC...................................................................................................................................................867
26
Contents










