Service Manual

Configuring an RMON Event..........................................................................................................................753
Configuring RMON Collection Statistics..................................................................................................... 754
Configuring the RMON Collection History.................................................................................................754
46 Rapid Spanning Tree Protocol (RSTP)...........................................................................................................756
Protocol Overview................................................................................................................................................. 756
Configuring Rapid Spanning Tree.......................................................................................................................756
Related Configuration Tasks.......................................................................................................................... 756
Important Points to Remember.......................................................................................................................... 756
RSTP and VLT.....................................................................................................................................................757
Configuring Interfaces for Layer 2 Mode.......................................................................................................... 757
Enabling Rapid Spanning Tree Protocol Globally........................................................................................... 758
Adding and Removing Interfaces....................................................................................................................... 760
Modifying Global Parameters..............................................................................................................................760
Enabling SNMP Traps for Root Elections and Topology Changes........................................................ 762
Modifying Interface Parameters..........................................................................................................................762
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................. 762
Influencing RSTP Root Selection........................................................................................................................ 762
Configuring an EdgePort......................................................................................................................................763
Configuring Fast Hellos for Link State Detection............................................................................................764
47 Software-Defined Networking (SDN)............................................................................................................765
48 Security...............................................................................................................................................................766
AAA Accounting......................................................................................................................................................766
Configuration Task List for AAA Accounting.............................................................................................. 766
AAA Authentication................................................................................................................................................768
Configuration Task List for AAA Authentication........................................................................................ 769
Obscuring Passwords and Keys........................................................................................................................... 771
AAA Authorization...................................................................................................................................................771
Privilege Levels Overview................................................................................................................................772
Configuration Task List for Privilege Levels.................................................................................................772
RADIUS......................................................................................................................................................................776
RADIUS Authentication....................................................................................................................................776
Configuration Task List for RADIUS.............................................................................................................. 777
TACACS+................................................................................................................................................................. 780
Configuration Task List for TACACS+..........................................................................................................780
TACACS+ Remote Authentication................................................................................................................782
Command Authorization................................................................................................................................ 783
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................783
Enabling SCP and SSH...........................................................................................................................................783
Using SCP with SSH to Copy a Software Image........................................................................................784
Removing the RSA Host Keys and Zeroizing Storage ..............................................................................785
Configuring When to Re-generate an SSH Key ........................................................................................785
Configuring the SSH Server Key Exchange Algorithm............................................................................. 786
Configuring the HMAC Algorithm for the SSH Server..............................................................................786
Configuring the HMAC Algorithm for the SSH Client...............................................................................787
9.10(0.0)
24