Users Guide

Chapter 44: Remote Monitoring (RMON)......................................................................................655
Implementation Information.............................................................................................................................................655
Fault Recovery.................................................................................................................................................................. 655
Setting the RMON Alarm...........................................................................................................................................655
Configuring an RMON Event.....................................................................................................................................656
Configuring RMON Collection Statistics..................................................................................................................657
Configuring the RMON Collection History...............................................................................................................657
Chapter 45: Rapid Spanning Tree Protocol (RSTP)........................................................................ 658
Protocol Overview............................................................................................................................................................ 658
Configuring Rapid Spanning Tree................................................................................................................................... 658
Important Points to Remember.......................................................................................................................................659
RSTP and VLT.............................................................................................................................................................659
Configuring Interfaces for Layer 2 Mode.......................................................................................................................659
Enabling Rapid Spanning Tree Protocol Globally.......................................................................................................... 660
Adding and Removing Interfaces.................................................................................................................................... 662
Modifying Global Parameters.......................................................................................................................................... 662
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................... 663
Modifying Interface Parameters..................................................................................................................................... 663
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................663
Influencing RSTP Root Selection.................................................................................................................................... 664
Configuring an EdgePort..................................................................................................................................................664
Configuring Fast Hellos for Link State Detection......................................................................................................... 665
Chapter 46: Software-Defined Networking (SDN)......................................................................... 666
Chapter 47: Security................................................................................................................... 667
AAA Accounting.................................................................................................................................................................667
Configuration Task List for AAA Accounting........................................................................................................... 667
AAA Authentication...........................................................................................................................................................669
Configuration Task List for AAA Authentication..................................................................................................... 669
Obscuring Passwords and Keys.......................................................................................................................................671
AAA Authorization..............................................................................................................................................................671
Privilege Levels Overview........................................................................................................................................... 671
Configuration Task List for Privilege Levels.............................................................................................................672
RADIUS...............................................................................................................................................................................675
RADIUS Authentication.............................................................................................................................................. 676
Configuration Task List for RADIUS..........................................................................................................................677
TACACS+...........................................................................................................................................................................679
Configuration Task List for TACACS+......................................................................................................................679
TACACS+ Remote Authentication........................................................................................................................... 680
Command Authorization............................................................................................................................................. 681
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................................................681
Enabling SCP and SSH.....................................................................................................................................................682
Using SCP with SSH to Copy a Software Image....................................................................................................682
Removing the RSA Host Keys and Zeroizing Storage .......................................................................................... 683
Configuring When to Re-generate an SSH Key .....................................................................................................683
Configuring the SSH Server Key Exchange Algorithm...........................................................................................684
Contents
21