Deployment Guide
Chapter 44: Remote Monitoring (RMON)...................................................................................744
Implementation Information..........................................................................................................................................744
Fault Recovery.................................................................................................................................................................744
Setting the RMON Alarm........................................................................................................................................ 744
Configuring an RMON Event..................................................................................................................................745
Configuring RMON Collection Statistics............................................................................................................. 746
Configuring the RMON Collection History..........................................................................................................746
Chapter 45: Rapid Spanning Tree Protocol (RSTP)....................................................................748
Protocol Overview.......................................................................................................................................................... 748
Configuring Rapid Spanning Tree................................................................................................................................748
Important Points to Remember................................................................................................................................... 749
RSTP and VLT............................................................................................................................................................749
Configuring Interfaces for Layer 2 Mode..................................................................................................................749
Enabling Rapid Spanning Tree Protocol Globally.....................................................................................................750
Adding and Removing Interfaces................................................................................................................................ 752
Modifying Global Parameters.......................................................................................................................................752
Enabling SNMP Traps for Root Elections and Topology Changes................................................................753
Modifying Interface Parameters..................................................................................................................................753
Enabling SNMP Traps for Root Elections and Topology Changes......................................................................754
Influencing RSTP Root Selection................................................................................................................................ 754
Configuring an EdgePort...............................................................................................................................................754
Configuring Fast Hellos for Link State Detection................................................................................................... 755
Chapter 46: Software-Defined Networking (SDN)..................................................................... 757
Chapter 47: Security................................................................................................................. 758
AAA Accounting...............................................................................................................................................................758
Configuration Task List for AAA Accounting......................................................................................................758
RADIUS Accounting..................................................................................................................................................760
AAA Authentication........................................................................................................................................................ 765
Configuration Task List for AAA Authentication............................................................................................... 765
Obscuring Passwords and Keys...................................................................................................................................768
AAA Authorization...........................................................................................................................................................768
Privilege Levels Overview....................................................................................................................................... 769
Configuration Task List for Privilege Levels....................................................................................................... 769
RADIUS.............................................................................................................................................................................. 773
RADIUS Authentication............................................................................................................................................773
Configuration Task List for RADIUS..................................................................................................................... 774
Support for Change of Authorization and Disconnect Messages packets..................................................777
TACACS+.......................................................................................................................................................................... 787
Configuration Task List for TACACS+................................................................................................................. 787
TACACS+ Remote Authentication........................................................................................................................789
Command Authorization..........................................................................................................................................790
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................790
Enabling SCP and SSH.................................................................................................................................................. 790
Using SCP with SSH to Copy a Software Image............................................................................................... 791
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 792
22
Contents