Setup Guide
Modifying Interface Parameters................................................................................................................................... 818
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 818
Inuencing RSTP Root Selection................................................................................................................................. 818
Conguring an EdgePort............................................................................................................................................... 819
Conguring Fast Hellos for Link State Detection...................................................................................................... 820
46 Software-Dened Networking (SDN).......................................................................................................821
47 Security................................................................................................................................................... 822
AAA Accounting.............................................................................................................................................................822
Conguration Task List for AAA Accounting........................................................................................................ 822
RADIUS Accounting.................................................................................................................................................824
AAA Authentication.......................................................................................................................................................830
Conguration Task List for AAA Authentication.................................................................................................. 830
Obscuring Passwords and Keys...................................................................................................................................833
AAA Authorization......................................................................................................................................................... 833
Privilege Levels Overview.......................................................................................................................................834
Conguration Task List for Privilege Levels..........................................................................................................834
RADIUS........................................................................................................................................................................... 838
RADIUS Authentication...........................................................................................................................................838
Conguration Task List for RADIUS...................................................................................................................... 840
Support for Change of Authorization and Disconnect Messages packets...................................................... 843
TACACS+........................................................................................................................................................................854
Conguration Task List for TACACS+...................................................................................................................854
TACACS+ Remote Authentication........................................................................................................................ 856
Command Authorization......................................................................................................................................... 857
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 857
Enabling SCP and SSH..................................................................................................................................................857
Using SCP with SSH to Copy a Software Image................................................................................................ 858
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 859
Conguring When to Re-generate an SSH Key ..................................................................................................859
Conguring the SSH Server Key Exchange Algorithm.......................................................................................860
Conguring the HMAC Algorithm for the SSH Server.......................................................................................860
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 861
Conguring the SSH Server Cipher List...............................................................................................................862
Conguring the SSH Client Cipher List................................................................................................................ 862
Conguring DNS in the SSH Server..................................................................................................................... 863
Secure Shell Authentication................................................................................................................................... 863
Troubleshooting SSH...............................................................................................................................................866
Telnet...............................................................................................................................................................................866
VTY Line and Access-Class Conguration................................................................................................................. 866
VTY Line Local Authentication and Authorization............................................................................................... 866
VTY Line Remote Authentication and Authorization...........................................................................................867
VTY MAC-SA Filter Support...................................................................................................................................867
Role-Based Access Control..........................................................................................................................................868
Overview of RBAC.................................................................................................................................................. 868
26
Contents










