Concept Guide

Conguring an EdgePort.............................................................................................................................................. 808
Conguring Fast Hellos for Link State Detection...................................................................................................... 809
46 Software-Dened Networking (SDN).......................................................................................................810
47 Security.................................................................................................................................................... 811
AAA Accounting.............................................................................................................................................................. 811
Conguration Task List for AAA Accounting..........................................................................................................811
RADIUS Accounting................................................................................................................................................. 813
AAA Authentication........................................................................................................................................................819
Conguration Task List for AAA Authentication...................................................................................................819
Obscuring Passwords and Keys...................................................................................................................................822
AAA Authorization......................................................................................................................................................... 822
Privilege Levels Overview.......................................................................................................................................823
Conguration Task List for Privilege Levels.......................................................................................................... 823
RADIUS........................................................................................................................................................................... 827
RADIUS Authentication...........................................................................................................................................827
Conguration Task List for RADIUS...................................................................................................................... 829
TACACS+........................................................................................................................................................................832
Conguration Task List for TACACS+................................................................................................................... 832
TACACS+ Remote Authentication.........................................................................................................................834
Command Authorization.........................................................................................................................................835
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................835
Enabling SCP and SSH................................................................................................................................................. 835
Using SCP with SSH to Copy a Software Image................................................................................................ 836
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................837
Conguring When to Re-generate an SSH Key ..................................................................................................837
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 838
Conguring the HMAC Algorithm for the SSH Server.......................................................................................838
Conguring the HMAC Algorithm for the SSH Client.........................................................................................839
Conguring the SSH Server Cipher List...............................................................................................................839
Conguring the SSH Client Cipher List................................................................................................................ 840
Secure Shell Authentication................................................................................................................................... 840
Troubleshooting SSH...............................................................................................................................................844
Telnet...............................................................................................................................................................................844
VTY Line and Access-Class Conguration................................................................................................................. 845
VTY Line Local Authentication and Authorization............................................................................................... 845
VTY Line Remote Authentication and Authorization...........................................................................................846
VTY MAC-SA Filter Support.................................................................................................................................. 846
Support for Change of Authorization and Disconnect Messages packets............................................................ 846
Change of Authorization (CoA) packets...............................................................................................................847
Disconnect Messages............................................................................................................................................. 847
Attributes.................................................................................................................................................................. 847
Error-cause Values.................................................................................................................................................. 850
CoA Packet Processing........................................................................................................................................... 851
CoA or DM Discard...................................................................................................................................................851
Contents
25