Administrator Guide

Conguring Rapid Spanning Tree.................................................................................................................................782
Related Conguration Tasks................................................................................................................................... 782
Important Points to Remember....................................................................................................................................782
RSTP and VLT.......................................................................................................................................................... 783
Conguring Interfaces for Layer 2 Mode....................................................................................................................783
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................784
Adding and Removing Interfaces.................................................................................................................................786
Modifying Global Parameters....................................................................................................................................... 786
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................788
Modifying Interface Parameters...................................................................................................................................788
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................788
Inuencing RSTP Root Selection.................................................................................................................................788
Conguring an EdgePort.............................................................................................................................................. 789
Conguring Fast Hellos for Link State Detection...................................................................................................... 790
47 Software-Dened Networking (SDN)....................................................................................................... 791
48 Security................................................................................................................................................... 792
AAA Accounting.............................................................................................................................................................792
Conguration Task List for AAA Accounting........................................................................................................ 792
AAA Authentication....................................................................................................................................................... 794
Conguration Task List for AAA Authentication.................................................................................................. 795
Obscuring Passwords and Keys...................................................................................................................................798
AAA Authorization......................................................................................................................................................... 798
Privilege Levels Overview.......................................................................................................................................798
Conguration Task List for Privilege Levels..........................................................................................................799
RADIUS........................................................................................................................................................................... 803
RADIUS Authentication...........................................................................................................................................803
Conguration Task List for RADIUS...................................................................................................................... 804
TACACS+........................................................................................................................................................................808
Conguration Task List for TACACS+...................................................................................................................808
TACACS+ Remote Authentication........................................................................................................................ 809
Command Authorization...........................................................................................................................................811
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................811
Enabling SCP and SSH...................................................................................................................................................811
Using SCP with SSH to Copy a Software Image................................................................................................. 812
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 813
Conguring When to Re-generate an SSH Key .................................................................................................. 813
Conguring the SSH Server Key Exchange Algorithm........................................................................................814
Conguring the HMAC Algorithm for the SSH Server........................................................................................814
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 815
Conguring the SSH Server Cipher List................................................................................................................815
Conguring the SSH Client Cipher List................................................................................................................. 816
Secure Shell Authentication....................................................................................................................................816
Troubleshooting SSH................................................................................................................................................819
Telnet................................................................................................................................................................................819
Contents
25