Users Guide
Important Points to Remember................................................................................................................................... 729
RSTP and VLT..........................................................................................................................................................730
Configuring Interfaces for Layer 2 Mode................................................................................................................... 730
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................731
Adding and Removing Interfaces.................................................................................................................................733
Modifying Global Parameters.......................................................................................................................................733
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................735
Modifying Interface Parameters..................................................................................................................................735
Enabling SNMP Traps for Root Elections and Topology Changes..........................................................................735
Influencing RSTP Root Selection.................................................................................................................................735
Configuring an EdgePort.............................................................................................................................................. 736
Configuring Fast Hellos for Link State Detection...................................................................................................... 737
43 Software-Defined Networking (SDN)......................................................................................................738
44 Security................................................................................................................................................... 739
AAA Accounting.............................................................................................................................................................739
Configuration Task List for AAA Accounting....................................................................................................... 739
AAA Authentication........................................................................................................................................................741
Configuration Task List for AAA Authentication..................................................................................................742
Obscuring Passwords and Keys...................................................................................................................................745
AAA Authorization......................................................................................................................................................... 745
Privilege Levels Overview.......................................................................................................................................745
Configuration Task List for Privilege Levels.........................................................................................................746
RADIUS........................................................................................................................................................................... 750
RADIUS Authentication...........................................................................................................................................750
Configuration Task List for RADIUS.......................................................................................................................751
TACACS+....................................................................................................................................................................... 754
Configuration Task List for TACACS+..................................................................................................................754
TACACS+ Remote Authentication........................................................................................................................756
Command Authorization......................................................................................................................................... 757
Protection from TCP Tiny and Overlapping Fragment Attacks.............................................................................. 757
Enabling SCP and SSH..................................................................................................................................................757
Using SCP with SSH to Copy a Software Image................................................................................................ 758
Removing the RSA Host Keys and Zeroizing Storage .......................................................................................759
Configuring When to Re-generate an SSH Key ................................................................................................. 759
Configuring the SSH Server Key Exchange Algorithm.......................................................................................760
Configuring the HMAC Algorithm for the SSH Server.......................................................................................760
Configuring the HMAC Algorithm for the SSH Client......................................................................................... 761
Configuring the SSH Server Cipher List...............................................................................................................762
Configuring the SSH Client Cipher List................................................................................................................ 762
Secure Shell Authentication................................................................................................................................... 763
Troubleshooting SSH.............................................................................................................................................. 765
Telnet.............................................................................................................................................................................. 765
VTY Line and Access-Class Configuration................................................................................................................. 766
VTY Line Local Authentication and Authorization...............................................................................................766
24
Contents










