Administrator Guide

Conguring Rapid Spanning Tree.................................................................................................................................779
Related Conguration Tasks................................................................................................................................... 779
Important Points to Remember....................................................................................................................................779
RSTP and VLT..........................................................................................................................................................780
Conguring Interfaces for Layer 2 Mode....................................................................................................................780
Enabling Rapid Spanning Tree Protocol Globally.........................................................................................................781
Adding and Removing Interfaces................................................................................................................................. 783
Modifying Global Parameters....................................................................................................................................... 783
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................785
Modifying Interface Parameters...................................................................................................................................785
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................785
Inuencing RSTP Root Selection.................................................................................................................................785
Conguring an EdgePort.............................................................................................................................................. 786
Conguring Fast Hellos for Link State Detection.......................................................................................................787
47 Software-Dened Networking (SDN)...................................................................................................... 788
48 Security................................................................................................................................................... 789
AAA Accounting.............................................................................................................................................................789
Conguration Task List for AAA Accounting........................................................................................................ 789
AAA Authentication........................................................................................................................................................791
Conguration Task List for AAA Authentication.................................................................................................. 792
Obscuring Passwords and Keys...................................................................................................................................795
AAA Authorization......................................................................................................................................................... 795
Privilege Levels Overview.......................................................................................................................................795
Conguration Task List for Privilege Levels..........................................................................................................796
RADIUS...........................................................................................................................................................................800
RADIUS Authentication.......................................................................................................................................... 800
Conguration Task List for RADIUS....................................................................................................................... 801
TACACS+........................................................................................................................................................................805
Conguration Task List for TACACS+...................................................................................................................805
TACACS+ Remote Authentication........................................................................................................................ 806
Command Authorization......................................................................................................................................... 807
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................808
Enabling SCP and SSH................................................................................................................................................. 808
Using SCP with SSH to Copy a Software Image................................................................................................ 809
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 810
Conguring When to Re-generate an SSH Key .................................................................................................. 810
Conguring the SSH Server Key Exchange Algorithm........................................................................................810
Conguring the HMAC Algorithm for the SSH Server.........................................................................................811
Conguring the HMAC Algorithm for the SSH Client.......................................................................................... 811
Conguring the SSH Server Cipher List................................................................................................................812
Conguring the SSH Client Cipher List................................................................................................................. 813
Secure Shell Authentication.................................................................................................................................... 813
Troubleshooting SSH................................................................................................................................................816
Telnet................................................................................................................................................................................816
Contents
25