Reference Guide

Configuring Interfaces for Layer 2 Mode..............................................................................................................582
Enabling Rapid Spanning Tree Protocol Globally.................................................................................................583
Adding and Removing Interfaces......................................................................................................................... 585
Modifying Global Parameters...............................................................................................................................586
Enabling SNMP Traps for Root Elections and Topology Changes.................................................................587
Modifying Interface Parameters.......................................................................................................................... 587
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................... 587
Influencing RSTP Root Selection..........................................................................................................................588
Configuring an EdgePort.......................................................................................................................................588
Configuring Fast Hellos for Link State Detection..................................................................................................589
38 Software-Defined Networking (SDN)................................................................................ 591
39 Security...................................................................................................................................593
AAA Accounting................................................................................................................................................... 593
Configuration Task List for AAA Accounting..................................................................................................593
AAA Authentication..............................................................................................................................................595
Configuration Task List for AAA Authentication............................................................................................ 595
AAA Authorization................................................................................................................................................ 597
Privilege Levels Overview.............................................................................................................................. 598
Configuration Task List for Privilege Levels................................................................................................... 598
RADIUS................................................................................................................................................................. 603
RADIUS Authentication and Authorization.................................................................................................... 603
Configuration Task List for RADIUS............................................................................................................... 604
TACACS+.............................................................................................................................................................. 607
Configuration Task List for TACACS+.............................................................................................................607
TACACS+ Remote Authentication and Authorization.................................................................................... 608
Command Authorization.................................................................................................................................610
Protection from TCP Tiny and Overlapping Fragment Attacks.............................................................................610
Enabling SCP and SSH..........................................................................................................................................610
Using SCP with SSH to Copy a Software Image............................................................................................ 611
Secure Shell Authentication.......................................................................................................................... 612
Troubleshooting SSH......................................................................................................................................614
Telnet.................................................................................................................................................................... 615
VTY Line and Access-Class Configuration........................................................................................................... 615
VTY Line Local Authentication and Authorization..........................................................................................615
VTY Line Remote Authentication and Authorization...................................................................................... 616
VTY MAC-SA Filter Support............................................................................................................................616
40 Service Provider Bridging....................................................................................................619
VLAN Stacking......................................................................................................................................................619
Important Points to Remember...................................................................................................................... 620