White Papers

Table Of Contents
Implementation Information..........................................................................................................................................736
Fault Recovery.................................................................................................................................................................736
Setting the RMON Alarm........................................................................................................................................ 736
Configuring an RMON Event..................................................................................................................................737
Configuring RMON Collection Statistics............................................................................................................. 738
Configuring the RMON Collection History..........................................................................................................738
Chapter 45: Rapid Spanning Tree Protocol (RSTP)....................................................................739
Protocol Overview.......................................................................................................................................................... 739
Configuring Rapid Spanning Tree................................................................................................................................739
Important Points to Remember................................................................................................................................... 740
RSTP and VLT............................................................................................................................................................740
Configuring Interfaces for Layer 2 Mode..................................................................................................................740
Enabling Rapid Spanning Tree Protocol Globally......................................................................................................741
Adding and Removing Interfaces................................................................................................................................ 743
Modifying Global Parameters....................................................................................................................................... 743
Enabling SNMP Traps for Root Elections and Topology Changes................................................................744
Modifying Interface Parameters..................................................................................................................................744
Enabling SNMP Traps for Root Elections and Topology Changes......................................................................745
Influencing RSTP Root Selection................................................................................................................................ 745
Configuring an EdgePort...............................................................................................................................................745
Configuring Fast Hellos for Link State Detection................................................................................................... 746
Chapter 46: Software-Defined Networking (SDN)..................................................................... 748
Chapter 47: Security................................................................................................................. 749
AAA Accounting...............................................................................................................................................................749
Configuration Task List for AAA Accounting......................................................................................................749
RADIUS Accounting...................................................................................................................................................751
AAA Authentication........................................................................................................................................................ 756
Configuration Task List for AAA Authentication............................................................................................... 756
Obscuring Passwords and Keys.................................................................................................................................. 759
AAA Authorization...........................................................................................................................................................759
Privilege Levels Overview....................................................................................................................................... 759
Configuration Task List for Privilege Levels.......................................................................................................760
RADIUS..............................................................................................................................................................................763
RADIUS Authentication............................................................................................................................................764
Configuration Task List for RADIUS..................................................................................................................... 765
Support for Change of Authorization and Disconnect Messages packets..................................................767
TACACS+.......................................................................................................................................................................... 777
Configuration Task List for TACACS+..................................................................................................................777
TACACS+ Remote Authentication........................................................................................................................ 779
Command Authorization..........................................................................................................................................780
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................780
Enabling SCP and SSH.................................................................................................................................................. 780
Using SCP with SSH to Copy a Software Image............................................................................................... 781
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 782
Configuring When to Re-generate an SSH Key ................................................................................................782
Configuring the SSH Server Key Exchange Algorithm.....................................................................................782
22
Contents