Service Manual

Conguring the RMON Collection History........................................................................................................... 694
42 Rapid Spanning Tree Protocol (RSTP).....................................................................................................696
Protocol Overview.........................................................................................................................................................696
Conguring Rapid Spanning Tree................................................................................................................................ 696
Related Conguration Tasks...................................................................................................................................696
Important Points to Remember................................................................................................................................... 696
RSTP and VLT.......................................................................................................................................................... 697
Conguring Interfaces for Layer 2 Mode....................................................................................................................697
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................698
Adding and Removing Interfaces.................................................................................................................................700
Modifying Global Parameters....................................................................................................................................... 700
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................702
Modifying Interface Parameters...................................................................................................................................702
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................702
Inuencing RSTP Root Selection.................................................................................................................................702
Conguring an EdgePort.............................................................................................................................................. 703
Conguring Fast Hellos for Link State Detection.......................................................................................................704
43 Software-Dened Networking (SDN)...................................................................................................... 705
44 Security................................................................................................................................................... 706
AAA Accounting.............................................................................................................................................................706
Conguration Task List for AAA Accounting........................................................................................................706
AAA Authentication....................................................................................................................................................... 708
Conguration Task List for AAA Authentication.................................................................................................. 709
Obscuring Passwords and Keys.....................................................................................................................................711
AAA Authorization...........................................................................................................................................................711
Privilege Levels Overview.........................................................................................................................................711
Conguration Task List for Privilege Levels...........................................................................................................712
RADIUS............................................................................................................................................................................716
RADIUS Authentication........................................................................................................................................... 716
Conguration Task List for RADIUS........................................................................................................................717
TACACS+........................................................................................................................................................................720
Conguration Task List for TACACS+................................................................................................................... 720
TACACS+ Remote Authentication..........................................................................................................................721
Command Authorization......................................................................................................................................... 722
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 723
Enabling SCP and SSH..................................................................................................................................................723
Using SCP with SSH to Copy a Software Image.................................................................................................724
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................725
Conguring When to Re-generate an SSH Key ..................................................................................................725
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 725
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 726
Conguring the HMAC Algorithm for the SSH Client.........................................................................................726
Conguring the SSH Server Cipher List............................................................................................................... 727
Conguring the SSH Client Cipher List.................................................................................................................727
Contents
23