Concept Guide
Modifying Global Parameters........................................................................................................................................816
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 818
Modifying Interface Parameters................................................................................................................................... 818
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 818
Inuencing RSTP Root Selection................................................................................................................................. 819
Conguring an EdgePort............................................................................................................................................... 819
Conguring Fast Hellos for Link State Detection...................................................................................................... 820
46 Software-Dened Networking (SDN).......................................................................................................821
47 Security................................................................................................................................................... 822
AAA Accounting.............................................................................................................................................................822
Conguration Task List for AAA Accounting........................................................................................................ 822
AAA Authentication....................................................................................................................................................... 824
Conguration Task List for AAA Authentication.................................................................................................. 825
Obscuring Passwords and Keys...................................................................................................................................828
AAA Authorization......................................................................................................................................................... 828
Privilege Levels Overview.......................................................................................................................................828
Conguration Task List for Privilege Levels..........................................................................................................829
RADIUS........................................................................................................................................................................... 833
RADIUS Authentication...........................................................................................................................................833
Conguration Task List for RADIUS...................................................................................................................... 834
Support for Change of Authorization and Disconnect Messages packets.......................................................837
TACACS+........................................................................................................................................................................848
Conguration Task List for TACACS+................................................................................................................... 848
TACACS+ Remote Authentication........................................................................................................................ 850
Command Authorization..........................................................................................................................................851
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 852
Enabling SCP and SSH................................................................................................................................................. 852
Using SCP with SSH to Copy a Software Image................................................................................................ 853
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 854
Conguring When to Re-generate an SSH Key ..................................................................................................854
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 854
Conguring the HMAC Algorithm for the SSH Server.......................................................................................855
Conguring the SSH Server Cipher List...............................................................................................................855
Conguring DNS in the SSH Server..................................................................................................................... 856
Secure Shell Authentication................................................................................................................................... 856
Troubleshooting SSH...............................................................................................................................................859
Telnet...............................................................................................................................................................................859
VTY Line and Access-Class Conguration................................................................................................................. 859
VTY Line Local Authentication and Authorization...............................................................................................860
VTY Line Remote Authentication and Authorization.......................................................................................... 860
VTY MAC-SA Filter Support................................................................................................................................... 861
Role-Based Access Control...........................................................................................................................................861
Overview of RBAC.................................................................................................................................................. 862
User Roles.................................................................................................................................................................864
26
Contents










