48 Security................................................................................................................................903
AAA Accounting..................................................................................................................... 903
Configuration Task List for AAA Accounting..............................................................903
AAA Authentication............................................................................................................... 906
Configuration Task List for AAA Authentication........................................................906
Obscuring Passwords and Keys..........................................................................................909
AAA Authorization.................................................................................................................. 910
Privilege Levels Overview............................................................................................... 910
Configuration Task List for Privilege Levels................................................................ 910
RADIUS......................................................................................................................................915
RADIUS Authentication....................................................................................................915
Configuration Task List for RADIUS..............................................................................916
TACACS+.................................................................................................................................920
Configuration Task List for TACACS+......................................................................... 920
TACACS+ Remote Authentication................................................................................922
Command Authorization................................................................................................923
Protection from TCP Tiny and Overlapping Fragment Attacks....................................923
Enabling SCP and SSH.......................................................................................................... 923
Using SCP with SSH to Copy a Software Image........................................................924
Removing the RSA Host Keys and Zeroizing Storage ............................................. 926
Configuring When to Re-generate an SSH Key ........................................................926
Configuring the SSH Server Key Exchange Algorithm............................................. 926
Configuring the HMAC Algorithm for the SSH Server..............................................927
Configuring the SSH Server Cipher List.......................................................................928
Secure Shell Authentication...........................................................................................928
Troubleshooting SSH.......................................................................................................931
Telnet........................................................................................................................................ 931
VTY Line and Access-Class Configuration....................................................................... 932
VTY Line Local Authentication and Authorization.................................................... 932
VTY Line Remote Authentication and Authorization................................................933
VTY MAC-SA Filter Support............................................................................................934
Role-Based Access Control.................................................................................................934
Overview of RBAC............................................................................................................935
User Roles.......................................................................................................................... 937
AAA Authentication and Authorization for Roles.......................................................941
Role Accounting...............................................................................................................944
Display Information About User Roles.........................................................................945
49 Service Provider Bridging.................................................................................................947
VLAN Stacking.........................................................................................................................947
Important Points to Remember....................................................................................948
9.10(0.1)
27