Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
Nexus 3600 NX-OS
Cisco Nexus 3600 NX-OS Manuals
Manuals and User Guides for Cisco Nexus 3600 NX-OS. We have
1
Cisco Nexus 3600 NX-OS manual available for free PDF download: Security Configuration Manual
Cisco Nexus 3600 NX-OS Security Configuration Manual (154 pages)
Brand:
Cisco
| Category:
Switch
| Size: 3.29 MB
Table of Contents
Table of Contents
3
Preface
11
Audience
11
Document Conventions
11
Obtaining Documentation and Submitting a Service Request
12
Documentation Feedback
12
Related Documentation for Cisco Nexus 3600 Platform Switches
13
New and Changed Information
15
CHAPTER 1 Newandchangedinformation
17
CHAPTER 2 Overview
17
Authentication, Authorization, and Accounting
17
RADIUS and TACACS+ Security Protocols
18
SSH and Telnet
18
SSH and Telnet
19
IP Acls
19
CHAPTER 3 Configuring AAA
21
Information about AAA
21
AAA Security Services
21
Benefits of Using AAA
22
Remote AAA Services
22
AAA Server Groups
22
AAA Service Configuration Options
23
Authentication and Authorization Process for User Logins
24
Prerequisites for Remote AAA
25
Guidelines and Limitations for AAA
26
Configuring AAA
26
Configuring Console Login Authentication Methods
26
Configuring Default Login Authentication Methods
27
Enabling Login Authentication Failure Messages
28
Logging Successful and Failed Login Attempts
29
Configuring AAA Command Authorization
30
Enabling MSCHAP Authentication
31
Configuring AAA Accounting Default Methods
32
Using AAA Server Vsas
34
Specifying Switch User Roles and Snmpv3 Parameters on AAA Servers
34
VSA Format
34
Vsas
34
Secure Login Enhancements
35
Configuring Login Parameters
35
Configuration Examples for Login Parameters
36
Restricting Sessions Per User-Per User Per Login
37
Configuring Share Key Value for Using RADIUS/TACACS
38
Enabling the Password Prompt for User Name
38
Monitoring and Clearing the Local AAA Accounting Log
39
Verifying the AAA Configuration
39
Configuration Examples for AAA
40
Default AAA Settings
40
CHAPTER 4 Configuring RADIUS
43
Information about RADIUS
43
RADIUS Network Environments
43
Information about RADIUS Operations
44
RADIUS Server Monitoring
45
Vendor-Specific Attributes
45
Prerequisites for RADIUS
46
Guidelines and Limitations for RADIUS
46
Configuring RADIUS Servers
46
Configuring RADIUS Server Hosts
47
Configuring RADIUS Global Preshared Keys
48
Configuring RADIUS Server Preshared Keys
48
Configuring RADIUS Server Groups
49
Configuring the Global Source Interface for RADIUS Server Groups
51
Allowing Users to Specify a RADIUS Server at Login
51
Configuring the Global RADIUS Transmission Retry Count and Timeout Interval
52
Configuring Accounting and Authentication Attributes for RADIUS Servers
53
Configuring Periodic RADIUS Server Monitoring
54
Configuring the Dead-Time Interval
55
Manually Monitoring RADIUS Servers or Groups
56
Verifying the RADIUS Configuration
57
Displaying RADIUS Server Statistics
57
Clearing RADIUS Server Statistics
57
Configuration Examples for RADIUS
58
Default Settings for RADIUS
58
Feature History for RADIUS
58
Chapter 5 Configuring TACACS
59
Information about Configuring TACACS
59
TACACS+ Advantages
59
User Login with TACACS
60
Default TACACS+ Server Encryption Type and Preshared Key
60
TACACS+ Server Monitoring
61
Prerequisites for TACACS
61
Guidelines and Limitations for TACACS
62
Configuring TACACS
62
TACACS+ Server Configuration Process
62
Enabling TACACS
62
Configuring TACACS+ Server Hosts
63
Configuring TACACS+ Global Preshared Keys
64
Configuring TACACS+ Server Groups
65
Configuring the Global Source Interface for TACACS+ Server Groups
66
Configuring the Global TACACS+ Timeout Interval
66
Configuring TCP Ports
67
Configuring the Timeout Interval for a Server
67
Configuring Periodic TACACS+ Server Monitoring
68
Configuring the Dead-Time Interval
69
Disabling TACACS
70
Manually Monitoring TACACS+ Servers or Groups
70
Displaying TACACS+ Statistics
71
Verifying the TACACS+ Configuration
71
Configuration Examples for TACACS
71
Default Settings for TACACS
72
Chapter 6 Configuring SSH and Telnet
73
Information about SSH and Telnet
73
SSH Server
73
SSH Client
73
SSH Server Keys
74
SSH Authentication Using Digital Certificates
74
Telnet Server
75
Guidelines and Limitations for SSH
75
Configuring SSH
75
Generating SSH Server Keys
75
Specifying the SSH Public Keys for User Accounts
76
Specifying the SSH Public Keys in Open SSH Format
76
Specifying the SSH Public Keys in IETF SECSH Format
77
Specifying the SSH Public Keys in PEM-Formatted Public Key Certificate Form
77
Configuring the SSH Source Interface
78
Starting SSH Sessions to Remote Devices
79
Clearing SSH Hosts
79
Disabling the SSH Server
79
Deleting SSH Server Keys
80
Clearing SSH Sessions
80
Configuration Examples for SSH
81
Configuring X.509V3 Certificate-Based SSH Authentication
82
Configuration Example for X.509V3 Certificate-Based SSH Authentication
84
Configuring Telnet
85
Enabling the Telnet Server
85
Reenabling the Telnet Server
85
Configuring the Telnet Source Interface
85
Starting Telnet Sessions to Remote Devices
86
Clearing Telnet Sessions
86
Verifying the SSH and Telnet Configuration
87
Default Settings for SSH
87
Chapter 7 Configuring IP Acls
89
Information about Acls
89
IP ACL Types and Applications
90
Application Order
90
Rules
90
Additional Filtering Options
91
Implicit Rules
91
Protocols
91
Sequence Numbers
91
Source and Destination
91
Logical Operators and Logical Operation Units
92
ACL TCAM Regions
92
Licensing Requirements for Acls
93
Prerequisites for Acls
93
Guidelines and Limitations for Acls
94
Default ACL Settings
94
ACL Logging
95
Configuring IP Acls
95
Creating an IP ACL
95
Configuring Ipv4 ACL Logging
96
Changing an IP ACL
98
Removing an IP ACL
99
Changing Sequence Numbers in an IP ACL
100
Applying an IP ACL to Mgmt0
100
Applying an IP ACL as a Port ACL
101
Applying an IP ACL as a Router ACL
101
Verifying the ACL Logging Configuration
102
About System Acls
103
Carving a TCAM Region
104
Configuring System Acls
104
Configuration and Show Command Examples for the System Acls
104
Configuring ACL Logging
106
Configuring the ACL Logging Cache
106
Applying ACL Logging to an Interface
107
Applying the ACL Log Match Level
108
Clearing Log Files
108
Verifying the ACL Logging Configuration
108
Configuring ACL TCAM Region Sizes
109
Reverting to the Default TCAM Region Sizes
111
Configuring Acls on Virtual Terminal Lines
111
Verifying Acls on VTY Lines
113
Configuration Examples for Acls on VTY Lines
113
Configuring Unicast RPF
115
Information about Unicast RPF
115
Unicast RPF Process
116
Global Statistics
116
Licensing Requirements for Unicast RPF
117
Guidelines and Limitations for Unicast RPF
117
CHAPTER 8 Configuring Unicast RPF
118
Configuration Examples for Unicast RPF
120
Verifying the Unicast RPF Configuration
120
Additional References for Unicast RPF
121
CHAPTER 9 Configuring Control Plane Policing
123
About Copp
123
Control Plane Protection
124
Classification for Copp
125
Control Plane Packet Types
125
Dynamic and Static Copp Acls
126
Rate Controlling Mechanisms
126
Default Policing Policies
127
Default Class Maps - for Cisco NX-OS Release 7.0(3)I3(1
128
Strict Default Copp Policy - for Cisco NX-OS Release 7.0(3)I3(1
130
Moderate Default Copp Policy - for Cisco NX-OS Release 7.0(3)I3(1
132
Lenient Default Copp Policy - for Cisco NX-OS Release 7.0(3)I3(1
134
Dense Default Copp Policy - for Cisco NX-OS Release 7.0(3)I3(1
136
Packets Per Second Credit Limit
138
Modular Qos Command-Line Interface
138
Copp and the Management Interface
138
Licensing Requirements for Copp
139
Guidelines and Limitations for Copp
139
Default Settings for Copp
141
Configuring Copp
141
Configuring a Control Plane Class Map
141
Configuring a Control Plane Policy Map
143
Configuring the Control Plane Service Policy
145
Configuring the Copp Scale Factor Per Line Card
146
Changing or Reapplying the Default Copp Policy
147
Copying the Copp Best Practice Policy
148
Verifying the Copp Configuration
149
Displaying the Copp Configuration Status
151
Monitoring Copp
151
Clearing the Copp Statistics
152
Configuration Examples for Copp
152
Copp Configuration Example
152
Changing or Reapplying the Default Copp Policy Using the Setup Utility
153
Additional References for Copp
154
Default Settings for Unicast RPF
118
Advertisement
Advertisement
Related Products
Cisco Nexus 3600
Cisco Nexus 3000 series
Cisco Nexus 3048
Cisco Nexus 3064
Cisco Nexus 3172
Cisco Nexus 31108
Cisco Nexus 3400 Series
Cisco Nexus 3500
Cisco Nexus 3548-10G, Nexus 3548-10GX
Cisco Nexus 3524
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL