Users Guide

Table Of Contents
RSTP and VLT...........................................................................................................................................................791
Conguring Interfaces for Layer 2 Mode.....................................................................................................................791
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................792
Adding and Removing Interfaces.................................................................................................................................794
Modifying Global Parameters....................................................................................................................................... 794
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................796
Modifying Interface Parameters...................................................................................................................................796
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................796
Inuencing RSTP Root Selection.................................................................................................................................796
Conguring an EdgePort...............................................................................................................................................797
Conguring Fast Hellos for Link State Detection.......................................................................................................798
46 Software-Dened Networking (SDN)...................................................................................................... 799
47 Security...................................................................................................................................................800
AAA Accounting............................................................................................................................................................ 800
Conguration Task List for AAA Accounting........................................................................................................800
AAA Authentication.......................................................................................................................................................802
Conguration Task List for AAA Authentication.................................................................................................. 803
Obscuring Passwords and Keys...................................................................................................................................806
AAA Authorization.........................................................................................................................................................806
Privilege Levels Overview.......................................................................................................................................806
Conguration Task List for Privilege Levels.......................................................................................................... 807
RADIUS.............................................................................................................................................................................811
RADIUS Authentication............................................................................................................................................ 811
Conguration Task List for RADIUS....................................................................................................................... 812
Support for Change of Authorization and Disconnect Messages packets.......................................................816
TACACS+........................................................................................................................................................................ 827
Conguration Task List for TACACS+................................................................................................................... 827
TACACS+ Remote Authentication.........................................................................................................................829
Command Authorization.........................................................................................................................................830
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................830
Enabling SCP and SSH................................................................................................................................................. 830
Using SCP with SSH to Copy a Software Image................................................................................................. 831
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 832
Conguring When to Re-generate an SSH Key ..................................................................................................832
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 833
Conguring the HMAC Algorithm for the SSH Server.......................................................................................833
Conguring the HMAC Algorithm for the SSH Client.........................................................................................834
Conguring the SSH Server Cipher List...............................................................................................................834
Conguring the SSH Client Cipher List................................................................................................................ 835
Conguring DNS in the SSH Server..................................................................................................................... 835
Secure Shell Authentication................................................................................................................................... 836
Troubleshooting SSH...............................................................................................................................................838
Telnet...............................................................................................................................................................................839
VTY Line and Access-Class Conguration................................................................................................................. 839
26
Contents