Administrator Guide

Enabling Rapid Spanning Tree Protocol Globally........................................................................... 688
Adding and Removing Interfaces.....................................................................................................690
Modifying Global Parameters........................................................................................................... 691
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 692
Modifying Interface Parameters.......................................................................................................692
Enabling SNMP Traps for Root Elections and Topology Changes.................................................693
Influencing RSTP Root Selection..................................................................................................... 693
Configuring an EdgePort..................................................................................................................693
Configuring Fast Hellos for Link State Detection............................................................................694
41 Software-Defined Networking (SDN).........................................................696
42 Security............................................................................................................ 697
AAA Accounting................................................................................................................................ 697
Configuration Task List for AAA Accounting..............................................................................697
AAA Authentication...........................................................................................................................699
Configuration Task List for AAA Authentication........................................................................ 700
Obscuring Passwords and Keys....................................................................................................... 702
AAA Authorization.............................................................................................................................703
Privilege Levels Overview........................................................................................................... 703
Configuration Task List for Privilege Levels............................................................................... 703
RADIUS.............................................................................................................................................. 709
RADIUS Authentication...............................................................................................................709
Configuration Task List for RADIUS............................................................................................710
TACACS+........................................................................................................................................... 713
Configuration Task List for TACACS+.........................................................................................713
TACACS+ Remote Authentication..............................................................................................715
Command Authorization.............................................................................................................716
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................716
Enabling SCP and SSH.......................................................................................................................716
Using SCP with SSH to Copy a Software Image.........................................................................717
Removing the RSA Host Keys and Zeroizing Storage ............................................................... 718
Configuring When to Re-generate an SSH Key ........................................................................ 718
Configuring the SSH Server Key Exchange Algorithm............................................................... 719
Configuring the HMAC Algorithm for the SSH Server............................................................... 719
Configuring the SSH Server Cipher List..................................................................................... 720
Secure Shell Authentication....................................................................................................... 720
Troubleshooting SSH.................................................................................................................. 723
Telnet.................................................................................................................................................724
VTY Line and Access-Class Configuration.......................................................................................724
VTY Line Local Authentication and Authorization..................................................................... 724
VTY Line Remote Authentication and Authorization.................................................................725