White Papers

Conguring RMON Collection Statistics...............................................................................................................792
Conguring the RMON Collection History........................................................................................................... 792
49 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 794
Protocol Overview......................................................................................................................................................... 794
Conguring Rapid Spanning Tree.................................................................................................................................794
Related Conguration Tasks................................................................................................................................... 794
Important Points to Remember..............................................................................................................................794
RSTP and VLT..........................................................................................................................................................795
Conguring Interfaces for Layer 2 Mode....................................................................................................................795
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................ 797
Adding and Removing Interfaces...........................................................................................................................799
Modifying Global Parameters................................................................................................................................. 799
Modifying Interface Parameters.............................................................................................................................801
Conguring an EdgePort.........................................................................................................................................801
Inuencing RSTP Root Selection...........................................................................................................................802
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................802
50 Software-Dened Networking (SDN)......................................................................................................804
51 Security................................................................................................................................................... 805
AAA Accounting............................................................................................................................................................ 805
Conguration Task List for AAA Accounting........................................................................................................805
AAA Authentication....................................................................................................................................................... 807
Conguration Task List for AAA Authentication.................................................................................................. 808
Obscuring Passwords and Keys.................................................................................................................................... 811
AAA Authorization...........................................................................................................................................................811
Privilege Levels Overview........................................................................................................................................ 811
Conguration Task List for Privilege Levels...........................................................................................................812
RADIUS............................................................................................................................................................................816
RADIUS Authentication and Authorization............................................................................................................816
Conguration Task List for RADIUS....................................................................................................................... 817
TACACS+.........................................................................................................................................................................821
Conguration Task List for TACACS+....................................................................................................................821
Command Authorization......................................................................................................................................... 823
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 823
Enabling SCP and SSH................................................................................................................................................. 823
Using SCP with SSH to Copy a Software Image.................................................................................................824
Secure Shell Authentication................................................................................................................................... 825
Enabling SSH Authentication by Password.......................................................................................................... 825
Using RSA Authentication of SSH.........................................................................................................................826
Conguring Host-Based SSH Authentication......................................................................................................826
Using Client-Based SSH Authentication...............................................................................................................827
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 827
Conguring the HMAC Algorithm for the SSH Client.........................................................................................828
Conguring the SSH Server Cipher List...............................................................................................................829
26
Contents