10.3.6 SNMP Traps for DMF Service Node Appliance.............................................................138
10.3.7 Managing the SNMPv3 Engine ID for Trap Receivers.................................................. 138
10.3.8 Configuring SNMPv3 Users........................................................................................... 139
10.3.9 SNMPv3 Command Examples.......................................................................................140
10.4 Configuring SNMP on a Specific Switch..................................................................................... 140
10.4.1 Using the GUI to Configure SNMP on a Specific Switch...............................................140
10.4.2 Using the CLI to Configure SNMP on a Specific Switch............................................... 141
10.5 SNMP Clear Trap.........................................................................................................................144
10.6 SNMP Trap Generation for Packet Drops and Link Saturation................................................... 145
10.6.1 Using the CLI to Configure the SNMP Traps................................................................ 149
Chapter 11: Using Authentication, Authorization, and Accounting.......151
11.1 Overview.......................................................................................................................................151
11.2 Using Local Groups and Users to Manage DMF Controller Access............................................151
11.2.1 Viewing Existing Groups and Users...............................................................................152
11.2.2 Using the GUI to Manage User Accounts......................................................................152
11.2.3 Using the CLI to Manage Groups and User Accounts...................................................153
11.2.4 Changing User Passwords.............................................................................................155
11.2.5 Password Reset............................................................................................................. 155
11.2.6 Managing Groups........................................................................................................... 156
11.2.7 Authentication with a User Token and REST API.......................................................... 157
11.3 Configuring AAA to Manage DMF Controller Access.................................................................. 157
11.3.1 Enabling Remote AAA Services.....................................................................................158
11.4 Time-based User Lockout............................................................................................................ 159
11.5 Using TACACS+ to Control Access to the DMF Controller......................................................... 161
11.5.1 Using the GUI to Add a TACACS+ Server.................................................................... 162
11.5.2 Using the CLI to Enable Remote Authentication and Authorization on the DMF
Fabric Controller................................................................................................................... 163
11.5.3 Using the CLI to Add a TACACS+ Server..................................................................... 163
11.6 Setting up a tac_plus Server....................................................................................................... 164
11.6.1 Using the Same Credentials for DMF and Other Devices............................................. 165
11.6.2 RBAC-Based Configuration for Non Default Group User...............................................165
11.7 Using RADIUS for Managing Access to the DMF Controller.......................................................166
11.7.1 Using the GUI to Add a RADIUS Server....................................................................... 166
11.7.2 Using the CLI to Add a RADIUS Server........................................................................ 167
11.7.3 Setting up a freeradius Server....................................................................................... 168
11.8 Custom admin role.......................................................................................................................169
11.8.1 Categories.......................................................................................................................169
11.8.2 PERMISSIONS & PRIVILEGE:...................................................................................... 175
11.8.3 CategoryIdentification:................................................................................................... 175
11.8.4 Groupmanagements:..................................................................................................... 175
11.8.5 Remote Users.................................................................................................................176
11.8.6 Commonly used profiles.................................................................................................176
11.8.7 Commonly used Category-feature Matrix.......................................................................179
Chapter 12: Management and Control Plane Security............................180
12.1 Management Plane Security........................................................................................................180
12.2 Importing the Controller Private Key and Certificate................................................................... 180
12.3 Using Certificates Signed by a CA for GUI Access to the Controller.......................................... 181
12.3.1 Replacing the Certificate................................................................................................183
12.4 Managing the Controller HTTP and SSH Ciphers, Protocols, and Data Integrity Algorithms.......184
12.4.1 Configuring HTTP Ciphers.............................................................................................184
12.4.2 Configuring HTTP Protocols.......................................................................................... 184
12.4.3 Configuring SSH Ciphers...............................................................................................185
vi