Users Guide

Conguring RMON Collection Statistics...............................................................................................................742
Conguring the RMON Collection History............................................................................................................742
42 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 744
Protocol Overview......................................................................................................................................................... 744
Conguring Rapid Spanning Tree.................................................................................................................................744
Related Conguration Tasks................................................................................................................................... 744
Important Points to Remember....................................................................................................................................744
RSTP and VLT.......................................................................................................................................................... 745
Conguring Interfaces for Layer 2 Mode....................................................................................................................745
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................746
Adding and Removing Interfaces................................................................................................................................. 748
Modifying Global Parameters........................................................................................................................................748
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................750
Modifying Interface Parameters.................................................................................................................................. 750
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................750
Inuencing RSTP Root Selection.................................................................................................................................750
Conguring an EdgePort............................................................................................................................................... 751
Conguring Fast Hellos for Link State Detection.......................................................................................................752
43 Software-Dened Networking (SDN)...................................................................................................... 753
44 Security................................................................................................................................................... 754
AAA Accounting.............................................................................................................................................................754
Conguration Task List for AAA Accounting........................................................................................................ 754
AAA Authentication.......................................................................................................................................................756
Conguration Task List for AAA Authentication...................................................................................................757
Obscuring Passwords and Keys...................................................................................................................................760
AAA Authorization......................................................................................................................................................... 760
Privilege Levels Overview.......................................................................................................................................760
Conguration Task List for Privilege Levels...........................................................................................................761
RADIUS........................................................................................................................................................................... 765
RADIUS Authentication...........................................................................................................................................765
Conguration Task List for RADIUS.......................................................................................................................766
TACACS+........................................................................................................................................................................ 770
Conguration Task List for TACACS+................................................................................................................... 770
TACACS+ Remote Authentication..........................................................................................................................771
Command Authorization......................................................................................................................................... 772
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................773
Enabling SCP and SSH..................................................................................................................................................773
Using SCP with SSH to Copy a Software Image.................................................................................................774
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................775
Conguring When to Re-generate an SSH Key ..................................................................................................775
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 775
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 776
Conguring the HMAC Algorithm for the SSH Client.........................................................................................776
24
Contents