White Papers

Table Of Contents
Chapter 49: Rapid Spanning Tree Protocol (RSTP)....................................................................730
Protocol Overview.......................................................................................................................................................... 730
Configuring Rapid Spanning Tree................................................................................................................................730
Important Points to Remember............................................................................................................................. 730
RSTP and VLT............................................................................................................................................................ 731
Configuring Interfaces for Layer 2 Mode...................................................................................................................731
Enabling Rapid Spanning Tree Protocol Globally.....................................................................................................733
Adding and Removing Interfaces...........................................................................................................................735
Modifying Global Parameters................................................................................................................................. 735
Modifying Interface Parameters............................................................................................................................736
Configuring an EdgePort.........................................................................................................................................736
Influencing RSTP Root Selection...........................................................................................................................737
Enabling SNMP Traps for Root Elections and Topology Changes................................................................ 737
Chapter 50: Software-Defined Networking (SDN)..................................................................... 738
Chapter 51: Security..................................................................................................................739
AAA Accounting...............................................................................................................................................................739
Configuration Task List for AAA Accounting......................................................................................................739
AAA Authentication......................................................................................................................................................... 741
Configuration Task List for AAA Authentication................................................................................................ 741
Obscuring Passwords and Keys...................................................................................................................................744
AAA Authorization...........................................................................................................................................................744
Privilege Levels Overview....................................................................................................................................... 744
Configuration Task List for Privilege Levels....................................................................................................... 745
RADIUS.............................................................................................................................................................................. 748
RADIUS Authentication and Authorization..........................................................................................................749
Configuration Task List for RADIUS..................................................................................................................... 750
TACACS+..........................................................................................................................................................................753
Configuration Task List for TACACS+................................................................................................................. 753
Command Authorization..........................................................................................................................................755
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 755
Enabling SCP and SSH.................................................................................................................................................. 755
Using SCP with SSH to Copy a Software Image.............................................................................................. 756
Secure Shell Authentication....................................................................................................................................757
Enabling SSH Authentication by Password.........................................................................................................757
Using RSA Authentication of SSH.........................................................................................................................757
Configuring Host-Based SSH Authentication.................................................................................................... 758
Using Client-Based SSH Authentication..............................................................................................................759
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 759
Configuring the HMAC Algorithm for the SSH Client......................................................................................759
Configuring the SSH Server Cipher List..............................................................................................................760
Configuring the SSH Client Cipher List............................................................................................................... 760
Troubleshooting SSH................................................................................................................................................ 761
Telnet..................................................................................................................................................................................761
VTY Line and Access-Class Configuration.................................................................................................................761
VTY Line Local Authentication and Authorization.............................................................................................762
VTY Line Remote Authentication and Authorization........................................................................................ 762
Contents
23