Users Guide

Protocol Overview......................................................................................................................................................... 732
Conguring Rapid Spanning Tree.................................................................................................................................732
Related Conguration Tasks................................................................................................................................... 732
Important Points to Remember....................................................................................................................................732
RSTP and VLT.......................................................................................................................................................... 733
Conguring Interfaces for Layer 2 Mode....................................................................................................................733
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................734
Adding and Removing Interfaces.................................................................................................................................736
Modifying Global Parameters....................................................................................................................................... 736
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................738
Modifying Interface Parameters...................................................................................................................................738
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................738
Inuencing RSTP Root Selection.................................................................................................................................738
Conguring an EdgePort.............................................................................................................................................. 739
Conguring Fast Hellos for Link State Detection.......................................................................................................740
43 Software-Dened Networking (SDN)....................................................................................................... 741
44 Security................................................................................................................................................... 742
AAA Accounting.............................................................................................................................................................742
Conguration Task List for AAA Accounting........................................................................................................ 742
AAA Authentication....................................................................................................................................................... 744
Conguration Task List for AAA Authentication...................................................................................................745
Obscuring Passwords and Keys................................................................................................................................... 748
AAA Authorization..........................................................................................................................................................748
Privilege Levels Overview....................................................................................................................................... 748
Conguration Task List for Privilege Levels.......................................................................................................... 749
RADIUS........................................................................................................................................................................... 753
RADIUS Authentication...........................................................................................................................................753
Conguration Task List for RADIUS.......................................................................................................................754
TACACS+........................................................................................................................................................................758
Conguration Task List for TACACS+................................................................................................................... 758
TACACS+ Remote Authentication.........................................................................................................................759
Command Authorization.........................................................................................................................................760
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................ 761
Enabling SCP and SSH.................................................................................................................................................. 761
Using SCP with SSH to Copy a Software Image.................................................................................................762
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................763
Conguring When to Re-generate an SSH Key ..................................................................................................763
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 763
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 764
Conguring the HMAC Algorithm for the SSH Client.........................................................................................764
Conguring the SSH Server Cipher List...............................................................................................................765
Conguring the SSH Client Cipher List.................................................................................................................766
Secure Shell Authentication................................................................................................................................... 766
Troubleshooting SSH...............................................................................................................................................769
24
Contents