Setup Guide

Conguring Rapid Spanning Tree................................................................................................................................. 710
Related Conguration Tasks....................................................................................................................................710
Important Points to Remember.................................................................................................................................... 710
RSTP and VLT............................................................................................................................................................711
Conguring Interfaces for Layer 2 Mode..................................................................................................................... 711
Enabling Rapid Spanning Tree Protocol Globally.........................................................................................................712
Adding and Removing Interfaces..................................................................................................................................713
Modifying Global Parameters........................................................................................................................................713
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 715
Modifying Interface Parameters................................................................................................................................... 715
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 715
Inuencing RSTP Root Selection................................................................................................................................. 715
Conguring an EdgePort............................................................................................................................................... 716
Conguring Fast Hellos for Link State Detection....................................................................................................... 717
44 Software-Dened Networking (SDN).......................................................................................................718
45 Security....................................................................................................................................................719
AAA Accounting..............................................................................................................................................................719
Conguration Task List for AAA Accounting.........................................................................................................719
RADIUS Accounting................................................................................................................................................. 721
AAA Authentication....................................................................................................................................................... 727
Conguration Task List for AAA Authentication...................................................................................................727
Obscuring Passwords and Keys...................................................................................................................................730
AAA Authorization......................................................................................................................................................... 730
Privilege Levels Overview........................................................................................................................................731
Conguration Task List for Privilege Levels...........................................................................................................731
RADIUS........................................................................................................................................................................... 735
RADIUS Authentication...........................................................................................................................................735
Conguration Task List for RADIUS.......................................................................................................................737
Support for Change of Authorization and Disconnect Messages packets.......................................................740
TACACS+.........................................................................................................................................................................751
Conguration Task List for TACACS+.................................................................................................................... 751
TACACS+ Remote Authentication.........................................................................................................................753
Command Authorization......................................................................................................................................... 754
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 754
Enabling SCP and SSH................................................................................................................................................. 754
Using SCP with SSH to Copy a Software Image................................................................................................ 755
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 756
Conguring When to Re-generate an SSH Key ..................................................................................................756
Conguring the SSH Server Key Exchange Algorithm........................................................................................757
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 757
Conguring the SSH Server Cipher List...............................................................................................................758
Conguring DNS in the SSH Server......................................................................................................................758
Secure Shell Authentication................................................................................................................................... 759
Troubleshooting SSH................................................................................................................................................761
Contents
25