Users Guide
Configuring the RMON Collection History........................................................................................................... 739
42 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 741
Protocol Overview..........................................................................................................................................................741
Configuring Rapid Spanning Tree.................................................................................................................................741
Related Configuration Tasks................................................................................................................................... 741
Important Points to Remember....................................................................................................................................741
RSTP and VLT..........................................................................................................................................................742
Configuring Interfaces for Layer 2 Mode................................................................................................................... 742
Enabling Rapid Spanning Tree Protocol Globally....................................................................................................... 743
Adding and Removing Interfaces.................................................................................................................................745
Modifying Global Parameters.......................................................................................................................................745
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................747
Modifying Interface Parameters.................................................................................................................................. 747
Enabling SNMP Traps for Root Elections and Topology Changes..........................................................................747
Influencing RSTP Root Selection.................................................................................................................................747
Configuring an EdgePort.............................................................................................................................................. 748
Configuring Fast Hellos for Link State Detection......................................................................................................749
43 Software-Defined Networking (SDN)......................................................................................................750
44 Security....................................................................................................................................................751
AAA Accounting..............................................................................................................................................................751
Configuration Task List for AAA Accounting........................................................................................................ 751
AAA Authentication....................................................................................................................................................... 753
Configuration Task List for AAA Authentication..................................................................................................754
Obscuring Passwords and Keys...................................................................................................................................757
AAA Authorization..........................................................................................................................................................757
Privilege Levels Overview.......................................................................................................................................757
Configuration Task List for Privilege Levels.........................................................................................................758
RADIUS........................................................................................................................................................................... 762
RADIUS Authentication...........................................................................................................................................762
Configuration Task List for RADIUS......................................................................................................................763
TACACS+....................................................................................................................................................................... 766
Configuration Task List for TACACS+..................................................................................................................766
TACACS+ Remote Authentication........................................................................................................................768
Command Authorization.........................................................................................................................................769
Protection from TCP Tiny and Overlapping Fragment Attacks.............................................................................. 769
Enabling SCP and SSH................................................................................................................................................. 769
Using SCP with SSH to Copy a Software Image................................................................................................ 770
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................771
Configuring When to Re-generate an SSH Key .................................................................................................. 771
Configuring the SSH Server Key Exchange Algorithm....................................................................................... 772
Configuring the HMAC Algorithm for the SSH Server....................................................................................... 772
Configuring the HMAC Algorithm for the SSH Client.........................................................................................773
Configuring the SSH Server Cipher List............................................................................................................... 774
24
Contents










