- Preface
- New and Changed Information
- Overview
- Configuring Authentication, Authorization, and Accounting
- Configuring RADIUS
- Configuring TACACS+
- Configuring LDAP
- Configuring SSH and Telnet
- Configuring PKI
- Configuring Access Control Lists
- Configuring Port Security
- Configuring DHCP Snooping
- Configuring IPv6 First-Hop Security
- Configuring Dynamic ARP Inspection
- Configuring 802.1X
- Configuring Unicast RPF
- Configuring Control Plane Policing
- Configuring Rate Limits
- Index
Contents
8 - A - B - C - D - E - F - G - H - I - L - M - N - P - R - S - T - U - V
Index
8
802.1Xauthenticator PAEs 1configuring 1default settings 1description 1enabling feature 1example configuration 1licensing requirements 1MAC authenication bypass 1multiple host support 1prerequisites 1single host support 1supported topologies 1verifying configuration 1802.1X authenticationauthorization states for ports 1enabling RADIUS accounting 1initiation 1802.1X reauthenticationsetting maximum retry count on interfaces 1802.1X supplicantsmanually reauthenticating 1A
AAAaccounting 1authentication 1benefits 1configuring console login 1configuring for RADIUS servers 1default settings 1description 1enabling MSCHAP authentication 1example configuration 1guidelines 1limitations 1prerequisites 1user login process 1verifying configurations 1AAA accountingconfiguring default methods 1aaa accounting dot1x default group 1AAA accounting logsclearing 1displaying 1aaa authentication dot1x default group 1aaa authorization default 1aaa authorization {group | local} 1aaa authorization {ssh-certificate | ssh-publickey} 1aaa group server ldap 1AAA loginsenabling authentication failure messages 1AAA protocolsRADIUS 1TACACS+ 1AAA server groupsdescription 1AAA serversspecifying user roles 1specifying user roles in VSAs 1AAA servicesconfiguration options 1remote 1accountingdescription 1ACLprocessing order 1sequence numbers 1ACL implicit rules 1ACL log match level, applying 1ACL logging 1ACL logging configuration, verifying 1ACL logging to an interface, Applying 1ACL TCAM regionsconfiguring 1reverting to default sizes 1acllog match-log-level 1ACLsapplications 1guidelines 1identifying traffic by protocols 1licensing 1limitations 1prerequisites 1types 1VLAN 1Applying ACL logging to an interface 1Applying the ACL log match level 1authentication802.1X 1description 1local 1methods 1remote 1user login 1authentication (bind-first | compare} 1authenticator PAEscreating on an interface 1description 1removing from an interface 1authorizationuser login 1B
BGPusing with Unicast RPF 1C
CA trust pointscreating associations for PKI 1CAsauthenticating 1configuring 1deleting certificates 1description 1displaying configuration 1enrollment using cut-and-paste 1example configuration 1example of downloading certificate 1generating identity certificate requests 1identity 1installing identity certificates 1multiple 1multiple trust points 1peer certificates 1purpose 1certificate authorities. 1See CAs 1certificate revocation checkingconfiguring methods 1certificate revocation lists 1See CRLs 1certificatesexample of revoking 1channel-group 1channel-group force 1channel-group mode 1channel-group {on | active | passive} 1Ciscocisco-av-pairclass mapsconfiguring for CoPP 1CoPP 1clear hardware rate-limiter module 1clear hardware rate-limiter {all | span-egress} 1clear ldap-server statistics 1clear port-security dynamic 1clear port-security dynamic address 1clearing statisticsCoPP 1configuration example 1configuration examplesCoPP 1configuration statusCoPP 1Configuring the ACL logging cache 1control plane class mapsverifying the configuration 1control plane policy mapsverifying the configuration 1control plane protectionCoPP 1packet types 1control plane protection, classification 1control plane protection, CoPPrate controlling mechanisms 1control plane service policy, configuringCoPP 1CoPP 1class maps 1clearing statistics 1configuration examples 1configuration status 1configuring class maps 1configuring policy maps 1control plane protection 1control plane protection, classification 1control plane service policy, configuring 1default policy 1disabling the rate limit 1guidelines 1information about 1licensing 1limitations 1monitoring 1policy templates 1restrictions for management interfaces 1upgrade guidelines 1verifying the configuration 1CoPP policylayer 2 1CoPP policy mapsconfiguring 1CRLsconfiguring 1description 1downloading 1generating 1importing example 1publishing 1crypto ca authentication 1crypto ca crl request 1crypto ca trustpoint 1D
DAIdefault settings 1guidelines 1limitations 1deafult settingsport security 1default CoPP policy 1default settings802.1X 1AAA 1DAI 1PKI 1denial-of-service attacksIP address spoofing, mitigating 1device rolesdescription for 802.1X 1DHCP binding database 1DHCP Option 82enabling or disabling data insertion and removal 1DHCP relay agentenabling or disabling 1enabling or disabling Option 82 1DHCP relay statisticsclearing 1DHCP server addressesconfiguring 1dhcp snoopinglicensing 1prerequisites 1DHCP snoopingbinding database 1default settings 1description 1guidelines 1limitations 1overview 1DHCP snooping binding database 1described 1description 1entries 1DHCPv6 relayconfiguring the source interface 1DHCPv6 relay agentdescribed 1enabling or disabling 1enabling or disabling VRF support 1VRF support 1DHCPv6 relay statisticsclearing 1digital certificatesconfiguring 1exporting 1importing 1peers 1purpose 1disabling the rate limitCoPP 1Displaying and clearing log files 1DoS attacksUnicast RPF, deploying 1dot1x default 1dot1x host-mode multi-host 1dot1x host-mode {multi-host | single-host} 1dot1x max-req 1dot1x port-control auto 1dot1x port-control {auto | force-authorized | forced-unauthorized} 1dot1x re-authentication 1dot1x timeout quiet-period 1dot1x timeout ratelimit-period 1dot1x timeout re-authperiod 1dot1x timeout server-timeout 1dot1x timeout supp-timeout 1dot1x timeout tx-period 1dynamic ARP inspectionARP cache poisoning 1ARP requests 1ARP spoofing attack 1DHCP snooping binding database 1function of 1interface trust states 1logging of dropped packets 1network security issues and interface trust states 1Dynamic Host Configuration Protocol snooping 1See DHCP snooping 1E
enable Cert-DN-match 1enable user-server-group 1examplesAAA configurations 1F
feature dot1x 1feature ldap 1feature port-security 1G
generate type7_encrypted_secret 1guidelinesACLs 1CoPP 1DAI 1DHCP snooping 1port security 1H
hardware rate-limiter access-list-log 1hardware rate-limiter span-egress 1hostnamesconfiguring for PKI 1I
identity certificatesdeleting for PKI 1generating requests 1installing 1IDsip access-group 1IP ACL implicit rules 1IP ACL statisticsclearing 1monitoring 1IP ACLsapplications 1applying as a Router ACL 1applying as port ACLs 1changing 1changing sequence numbers in 1description 1logical operation units 1logical operators 1removing 1types 1IP domain namesconfiguring for PKI 1ip verify unicast source reachable-via 1ipv6 verify unicast source reachable-via 1L
layer 2CoPP policy 1ldap search-map 1ldap-server host idle-time 1ldap-server host rootDN 1ldap-server host test rootDN 1ldap-server host username 1ldap-server timeout 1licensing802.1X 1ACLs 1CoPP 1dhcp snooping 1PKI 1Unicast RPF 1limitationsACLs 1CoPP 1DAI 1DHCP snooping 1port security 1logging ip access-list cache entries 1logging ip access-list cache interval 1logging ip access-list cache threshold 1logical operation unitsIP ACLs 1logical operators***IP ACLs 1loginRADIUS servers 1login on-failure log 1login on-success log 1LOU 1See logical operation units 1M
MAC ACL implicit rules 1MAC addresseslearning 1MAC authenticationbypass for 802.1X 1management interfacesCoPP restrictions 1monitoringCoPP 1RADIUS 1RADIUS servers 1MSCHAPenabling authentication 1N
no dot1x system-auth-control 1no feature dot1x 1no feature ssh 1P
PKIcertificate revocation checking 1configuring hostnames 1configuring IP domain names 1default settings 1description 1displaying configuration 1enrollment support 1example configuration 1generating RSA key pairs 1guidelines 1licensing 1limitations 1policy templatesdescription 1port ACL 1port securitydefault settings 1guidelines 1limitations 1MAC address learning 1MAC move 1violations 1portsauthorization states for 802.1X 1prerequisitesdhcp snooping 1preshared keysTACACS+ 1R
RADIUSconfiguring servers 1configuring timeout intervals 1configuring transmission retry counts 1default settings 1description 1example configurations 1monitoring 1network environments 1operations 1prerequisites 1statistics, displaying 1RADIUS accountingenabling for 802.1X authentication 1RADIUS server groupsglobal source interfaces 1RADIUS server preshared keys 1RADIUS serversallowing users to specify at login 1configuring AAA for 1configuring timeout interval 1configuring transmission retry count 1deleting hosts 1example configurations 1manually monitoring 1RADIUS statisticsclearing 1RADIUS, global preshared keys 1RADIUS, periodic server monitoring 1RADIUS, server hostsconfiguring 1rate controlling mechanismscontrol plane protection, CoPP 1rate limitsguidelines 1limitations 1remote devicesconnecting to using SSH 1router ACLs 1RSA key pairsdeleting from an Cisco NX-OS device 1exporting 1generating for PKI 1importing 1RSA key-pairsdescription 1displaying configuration 1exporting 1importing 1multiple 1rulesimplicit 1S
sample configuration 1secure MAC addresseslearning 1securityportMAC address learning 1server 1server groups 1serversRADIUS 1show aaa accounting 1show aaa authorization 1show crypto ca certificates 1show crypto ca crl 1show dot1x interface ethernet 1show dot1x {all | interface ethernet} 1show hardware access-list tcam region 1show hardware access-list tcam template 1show hardware rate-limiter module 1show ip access-lists 1show ipv6 access-lists 1show logging ip access-list status 1show login on-failure log 1show login on-successful log 1show port-security address interface 1show port-security interface 1show radius-server 1show radius-server group 1show running-config acllog 1show running-config aclmgr 1show running-config aclmgr all 1show running-config ldap 1show ssh key 1show startup-config acllog 1show startup-config aclmgr 1show startup-config aclmgr all 1show startup-config ldap 1show users 1SNMPv3specifying AAA parameters 1specifying parameters for AAA servers 1source interfacesRADIUS server groups 1TACACS+ server groups 1SSHdescription 1SSH clients 1SSH servers 1SSH sessionsclearing 1connecting to remote devices 1statisticsclearing 1monitoring 1TACACS+ 1switchport port-security 1switchport port-security aging time 1switchport port-security aging type 1switchport port-security maximum 1switchport port-security violation 1T
TACACS+advantages over RADIUS 1configuring 1configuring global timeout interval 1displaying statistics 1example configurations 1field descriptions 1global preshared keys 1limitations 1prerequisites 1preshared key 1user login operation 1TACACS+ server groupsglobal source interfaces 1TACACS+ serversconfiguring hosts 1configuring TCP ports 1configuring timeout interval 1field descriptions 1manually monitoring 1TCAMsconfiguring 1reverting to default sizes 1TCP portsTACACS+ servers 1Telnetdescription 1Telnet serverenabling 1reenabling 1Telnet servers 1Telnet sessionsclearing 1connecting to remote devices 1trust pointsdescription 1multiple 1saving configuration across reboots 1U
Unicast RPFBGP attributes 1BOOTP and 1default settings 1deploying 1description 1DHCP and 1example configurations 1FIB 1guidelines 1implementation 1licensing 1limitations 1loose mode 1strict mode 1tunneling and 1verifying configuration 1upgradeguidelines for CoPP 1use-vrf 1user loginauthentication process 1authorization process 1user rolesusername password 1V
vendor-specific attributes 1verifyingRADUIS configuration 1TACACS+ configuration 1Verifying the ACL logging configuration 1VLAN ACLsinformation about 1VSAsformat 1protocol options 1support description 1