Service Manual

46 Rapid Spanning Tree Protocol (RSTP)...........................................................................................................751
Protocol Overview..................................................................................................................................................751
Configuring Rapid Spanning Tree....................................................................................................................... 751
Related Configuration Tasks...........................................................................................................................751
Important Points to Remember...........................................................................................................................751
RSTP and VLT.................................................................................................................................................... 752
Configuring Interfaces for Layer 2 Mode.......................................................................................................... 752
Enabling Rapid Spanning Tree Protocol Globally............................................................................................753
Adding and Removing Interfaces........................................................................................................................755
Modifying Global Parameters.............................................................................................................................. 755
Enabling SNMP Traps for Root Elections and Topology Changes.........................................................757
Modifying Interface Parameters.......................................................................................................................... 757
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................. 757
Influencing RSTP Root Selection........................................................................................................................ 757
Configuring an EdgePort......................................................................................................................................758
Configuring Fast Hellos for Link State Detection............................................................................................ 759
47 Software-Defined Networking (SDN)........................................................................................................... 760
48 Security............................................................................................................................................................... 761
AAA Accounting...................................................................................................................................................... 761
Configuration Task List for AAA Accounting...............................................................................................761
AAA Authentication................................................................................................................................................763
Configuration Task List for AAA Authentication........................................................................................ 764
Obscuring Passwords and Keys.......................................................................................................................... 766
AAA Authorization.................................................................................................................................................. 766
Privilege Levels Overview................................................................................................................................767
Configuration Task List for Privilege Levels................................................................................................ 767
RADIUS...................................................................................................................................................................... 771
RADIUS Authentication.................................................................................................................................... 771
Configuration Task List for RADIUS.............................................................................................................. 772
TACACS+..................................................................................................................................................................775
Configuration Task List for TACACS+.......................................................................................................... 775
TACACS+ Remote Authentication................................................................................................................ 777
Command Authorization................................................................................................................................ 778
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................778
Enabling SCP and SSH...........................................................................................................................................778
Using SCP with SSH to Copy a Software Image........................................................................................ 779
Removing the RSA Host Keys and Zeroizing Storage ............................................................................. 780
Configuring When to Re-generate an SSH Key ........................................................................................780
Configuring the SSH Server Key Exchange Algorithm..............................................................................781
Configuring the HMAC Algorithm for the SSH Server.............................................................................. 781
Configuring the HMAC Algorithm for the SSH Client...............................................................................782
Configuring the SSH Server Cipher List.......................................................................................................782
Configuring the SSH Client Cipher List........................................................................................................783
Secure Shell Authentication........................................................................................................................... 783
9.10(0.1)
24