Users Guide
44 Security................................................................................................................................................... 724
AAA Accounting.............................................................................................................................................................724
Conguration Task List for AAA Accounting........................................................................................................ 724
AAA Authentication....................................................................................................................................................... 726
Conguration Task List for AAA Authentication...................................................................................................727
Obscuring Passwords and Keys...................................................................................................................................729
AAA Authorization......................................................................................................................................................... 729
Privilege Levels Overview....................................................................................................................................... 730
Conguration Task List for Privilege Levels..........................................................................................................730
RADIUS........................................................................................................................................................................... 734
RADIUS Authentication...........................................................................................................................................734
Conguration Task List for RADIUS.......................................................................................................................736
TACACS+........................................................................................................................................................................738
Conguration Task List for TACACS+................................................................................................................... 738
TACACS+ Remote Authentication.........................................................................................................................740
Command Authorization.......................................................................................................................................... 741
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................ 741
Enabling SCP and SSH...................................................................................................................................................741
Using SCP with SSH to Copy a Software Image.................................................................................................742
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................743
Conguring When to Re-generate an SSH Key .................................................................................................. 743
Conguring the SSH Server Key Exchange Algorithm........................................................................................744
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 744
Conguring the SSH Server Cipher List............................................................................................................... 745
Secure Shell Authentication....................................................................................................................................745
Troubleshooting SSH............................................................................................................................................... 748
Telnet............................................................................................................................................................................... 748
VTY Line and Access-Class Conguration..................................................................................................................748
VTY Line Local Authentication and Authorization................................................................................................749
VTY Line Remote Authentication and Authorization...........................................................................................749
VTY MAC-SA Filter Support.................................................................................................................................. 750
Role-Based Access Control..........................................................................................................................................750
Overview of RBAC................................................................................................................................................... 751
User Roles.................................................................................................................................................................753
AAA Authentication and Authorization for Roles.................................................................................................756
Role Accounting.......................................................................................................................................................759
Display Information About User Roles...................................................................................................................760
45 Service Provider Bridging........................................................................................................................ 762
VLAN Stacking...............................................................................................................................................................762
Important Points to Remember..............................................................................................................................763
Congure VLAN Stacking.......................................................................................................................................763
Creating Access and Trunk Ports...........................................................................................................................764
Enable VLAN-Stacking for a VLAN.......................................................................................................................765
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 765
24
Contents










