Concept Guide

Modifying Global Parameters........................................................................................................................................821
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................823
Modifying Interface Parameters...................................................................................................................................823
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................823
Inuencing RSTP Root Selection.................................................................................................................................824
Conguring an EdgePort.............................................................................................................................................. 824
Conguring Fast Hellos for Link State Detection...................................................................................................... 825
46 Software-Dened Networking (SDN)...................................................................................................... 826
47 Security................................................................................................................................................... 827
AAA Accounting.............................................................................................................................................................827
Conguration Task List for AAA Accounting........................................................................................................ 827
RADIUS Accounting................................................................................................................................................ 829
AAA Authentication.......................................................................................................................................................835
Conguration Task List for AAA Authentication.................................................................................................. 835
Obscuring Passwords and Keys...................................................................................................................................838
AAA Authorization......................................................................................................................................................... 838
Privilege Levels Overview.......................................................................................................................................839
Conguration Task List for Privilege Levels..........................................................................................................839
RADIUS........................................................................................................................................................................... 843
RADIUS Authentication...........................................................................................................................................843
Conguration Task List for RADIUS...................................................................................................................... 845
Support for Change of Authorization and Disconnect Messages packets.......................................................847
TACACS+........................................................................................................................................................................859
Conguration Task List for TACACS+...................................................................................................................859
TACACS+ Remote Authentication........................................................................................................................ 860
Command Authorization..........................................................................................................................................861
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 862
Enabling SCP and SSH................................................................................................................................................. 862
Using SCP with SSH to Copy a Software Image................................................................................................ 863
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 864
Conguring When to Re-generate an SSH Key ..................................................................................................864
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 864
Conguring the HMAC Algorithm for the SSH Server.......................................................................................865
Conguring the SSH Server Cipher List...............................................................................................................865
Conguring DNS in the SSH Server..................................................................................................................... 866
Secure Shell Authentication................................................................................................................................... 866
Troubleshooting SSH...............................................................................................................................................869
Telnet...............................................................................................................................................................................869
VTY Line and Access-Class Conguration................................................................................................................. 869
VTY Line Local Authentication and Authorization............................................................................................... 870
VTY Line Remote Authentication and Authorization...........................................................................................870
VTY MAC-SA Filter Support................................................................................................................................... 871
Role-Based Access Control...........................................................................................................................................871
Overview of RBAC...................................................................................................................................................872
26
Contents