Administrator Guide

Important Points to Remember....................................................................................................................................781
RSTP and VLT..........................................................................................................................................................782
Configuring Interfaces for Layer 2 Mode................................................................................................................... 782
Enabling Rapid Spanning Tree Protocol Globally....................................................................................................... 783
Adding and Removing Interfaces.................................................................................................................................785
Modifying Global Parameters.......................................................................................................................................785
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................787
Modifying Interface Parameters.................................................................................................................................. 787
Enabling SNMP Traps for Root Elections and Topology Changes..........................................................................787
Influencing RSTP Root Selection.................................................................................................................................787
Configuring an EdgePort.............................................................................................................................................. 788
Configuring Fast Hellos for Link State Detection......................................................................................................789
47 Software-Defined Networking (SDN)......................................................................................................790
48 Security....................................................................................................................................................791
AAA Accounting..............................................................................................................................................................791
Configuration Task List for AAA Accounting........................................................................................................ 791
AAA Authentication....................................................................................................................................................... 793
Configuration Task List for AAA Authentication..................................................................................................794
Obscuring Passwords and Keys...................................................................................................................................797
AAA Authorization..........................................................................................................................................................797
Privilege Levels Overview.......................................................................................................................................797
Configuration Task List for Privilege Levels.........................................................................................................798
RADIUS...........................................................................................................................................................................802
RADIUS Authentication.......................................................................................................................................... 802
Configuration Task List for RADIUS......................................................................................................................803
TACACS+....................................................................................................................................................................... 806
Configuration Task List for TACACS+..................................................................................................................806
TACACS+ Remote Authentication........................................................................................................................808
Command Authorization.........................................................................................................................................809
Protection from TCP Tiny and Overlapping Fragment Attacks..............................................................................809
Enabling SCP and SSH................................................................................................................................................. 809
Using SCP with SSH to Copy a Software Image.................................................................................................810
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 811
Configuring When to Re-generate an SSH Key ...................................................................................................811
Configuring the SSH Server Key Exchange Algorithm........................................................................................812
Configuring the HMAC Algorithm for the SSH Server........................................................................................812
Configuring the HMAC Algorithm for the SSH Client......................................................................................... 813
Configuring the SSH Server Cipher List................................................................................................................814
Configuring the SSH Client Cipher List................................................................................................................. 814
Secure Shell Authentication....................................................................................................................................815
Troubleshooting SSH............................................................................................................................................... 817
Telnet............................................................................................................................................................................... 817
VTY Line and Access-Class Configuration..................................................................................................................818
VTY Line Local Authentication and Authorization................................................................................................818
Contents
25