Users Guide
Configuring RMON Collection Statistics.....................................................................................................704
Configuring the RMON Collection History.................................................................................................704
42 Rapid Spanning Tree Protocol (RSTP).......................................................................................................... 706
Protocol Overview.................................................................................................................................................706
Configuring Rapid Spanning Tree...................................................................................................................... 706
Related Configuration Tasks..........................................................................................................................706
Important Points to Remember..........................................................................................................................706
RSTP and VLT.................................................................................................................................................... 707
Configuring Interfaces for Layer 2 Mode.......................................................................................................... 707
Enabling Rapid Spanning Tree Protocol Globally........................................................................................... 708
Adding and Removing Interfaces........................................................................................................................710
Modifying Global Parameters...............................................................................................................................710
Enabling SNMP Traps for Root Elections and Topology Changes.........................................................712
Modifying Interface Parameters.......................................................................................................................... 712
Enabling SNMP Traps for Root Elections and Topology Changes...............................................................712
Influencing RSTP Root Selection.........................................................................................................................712
Configuring an EdgePort.......................................................................................................................................713
Configuring Fast Hellos for Link State Detection............................................................................................ 714
43 Software-Defined Networking (SDN)............................................................................................................715
44 Security............................................................................................................................................................... 716
AAA Accounting...................................................................................................................................................... 716
Configuration Task List for AAA Accounting...............................................................................................716
AAA Authentication................................................................................................................................................ 718
Configuration Task List for AAA Authentication.........................................................................................719
Obscuring Passwords and Keys...........................................................................................................................721
AAA Authorization...................................................................................................................................................721
Privilege Levels Overview................................................................................................................................722
Configuration Task List for Privilege Levels................................................................................................ 722
RADIUS..................................................................................................................................................................... 726
RADIUS Authentication................................................................................................................................... 726
Configuration Task List for RADIUS.............................................................................................................. 727
TACACS+................................................................................................................................................................. 730
Configuration Task List for TACACS+..........................................................................................................730
TACACS+ Remote Authentication................................................................................................................732
Command Authorization................................................................................................................................ 733
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................733
Enabling SCP and SSH...........................................................................................................................................733
Using SCP with SSH to Copy a Software Image........................................................................................ 734
Removing the RSA Host Keys and Zeroizing Storage ..............................................................................735
Configuring When to Re-generate an SSH Key ........................................................................................ 735
Configuring the SSH Server Key Exchange Algorithm..............................................................................736
Configuring the HMAC Algorithm for the SSH Server..............................................................................736
Configuring the HMAC Algorithm for the SSH Client...............................................................................737
Configuring the SSH Server Cipher List....................................................................................................... 737
Contents
23










