Administrator Guide
Protocol Overview......................................................................................................................................................... 734
Conguring Rapid Spanning Tree.................................................................................................................................734
Related Conguration Tasks................................................................................................................................... 734
Important Points to Remember....................................................................................................................................734
RSTP and VLT..........................................................................................................................................................735
Conguring Interfaces for Layer 2 Mode....................................................................................................................735
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................736
Adding and Removing Interfaces................................................................................................................................. 738
Modifying Global Parameters....................................................................................................................................... 738
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................740
Modifying Interface Parameters...................................................................................................................................740
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................740
Inuencing RSTP Root Selection.................................................................................................................................740
Conguring an EdgePort............................................................................................................................................... 741
Conguring Fast Hellos for Link State Detection.......................................................................................................742
43 Software-Dened Networking (SDN)...................................................................................................... 743
44 Security................................................................................................................................................... 744
AAA Accounting............................................................................................................................................................. 744
Conguration Task List for AAA Accounting........................................................................................................ 744
AAA Authentication....................................................................................................................................................... 746
Conguration Task List for AAA Authentication...................................................................................................747
Obscuring Passwords and Keys...................................................................................................................................750
AAA Authorization......................................................................................................................................................... 750
Privilege Levels Overview.......................................................................................................................................750
Conguration Task List for Privilege Levels...........................................................................................................751
RADIUS........................................................................................................................................................................... 755
RADIUS Authentication...........................................................................................................................................755
Conguration Task List for RADIUS...................................................................................................................... 756
TACACS+........................................................................................................................................................................760
Conguration Task List for TACACS+................................................................................................................... 760
TACACS+ Remote Authentication..........................................................................................................................761
Command Authorization......................................................................................................................................... 763
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 763
Enabling SCP and SSH..................................................................................................................................................763
Using SCP with SSH to Copy a Software Image.................................................................................................764
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................765
Conguring When to Re-generate an SSH Key ..................................................................................................765
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 766
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 766
Conguring the HMAC Algorithm for the SSH Client.........................................................................................767
Conguring the SSH Server Cipher List............................................................................................................... 767
Conguring the SSH Client Cipher List.................................................................................................................768
Secure Shell Authentication................................................................................................................................... 768
Troubleshooting SSH................................................................................................................................................771
24
Contents










