Administrator Guide
Fault Recovery...............................................................................................................................................................663
Setting the rmon Alarm............................................................................................................................................663
Conguring an RMON Event................................................................................................................................... 664
Conguring RMON Collection Statistics.................................................................................................................. 665
Conguring the RMON Collection History............................................................................................................... 665
Enabling an RMON MIB Collection History Group....................................................................................................666
45 Rapid Spanning Tree Protocol (RSTP)...................................................................... 667
Protocol Overview..........................................................................................................................................................667
Conguring Rapid Spanning Tree....................................................................................................................................667
Related Conguration Tasks..................................................................................................................................... 667
Important Points to Remember................................................................................................................................ 667
Conguring Interfaces for Layer 2 Mode........................................................................................................................668
Enabling Rapid Spanning Tree Protocol Globally.............................................................................................................668
Adding and Removing Interfaces....................................................................................................................................670
Modifying Global Parameters.......................................................................................................................................... 671
Enable BPDU Filtering Globally....................................................................................................................................... 672
Modifying Interface Parameters..................................................................................................................................... 672
Conguring an EdgePort................................................................................................................................................ 673
Inuencing RSTP Root Selection....................................................................................................................................674
SNMP Traps for Root Elections and Topology Changes..................................................................................................674
Conguring Fast Hellos for Link State Detection............................................................................................................ 674
46 Security.................................................................................................................... 676
AAA Accounting.............................................................................................................................................................676
Conguration Task List for AAA Accounting.............................................................................................................676
AAA Authentication........................................................................................................................................................678
Conguration Task List for AAA Authentication........................................................................................................678
AAA Authorization......................................................................................................................................................... 680
Privilege Levels Overview........................................................................................................................................ 680
Conguration Task List for Privilege Levels............................................................................................................... 681
RADIUS..........................................................................................................................................................................685
RADIUS Authentication and Authorization............................................................................................................... 685
Conguration Task List for RADIUS..........................................................................................................................686
TACACS+.......................................................................................................................................................................688
Conguration Task List for TACACS+.......................................................................................................................688
Choosing TACACS+ as the Authentication Method................................................................................................. 689
Monitoring TACACS+...............................................................................................................................................690
TACACS+ Remote Authentication and Authorization...............................................................................................690
Specifying a TACACS+ Server Host......................................................................................................................... 691
Command Authorization........................................................................................................................................... 691
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................................691
Enabling SCP and SSH...................................................................................................................................................692
Using SCP with SSH to Copy a Software Image......................................................................................................692
Removing the RSA Host Keys and Zeroizing Storage ..............................................................................................693
Conguring When to Re-generate an SSH Key .......................................................................................................694
22