Concept Guide

Fault Recovery................................................................................................................................................................791
Setting the RMON Alarm........................................................................................................................................792
Conguring an RMON Event..................................................................................................................................792
Conguring RMON Collection Statistics...............................................................................................................793
Conguring the RMON Collection History........................................................................................................... 793
45 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 795
Protocol Overview.........................................................................................................................................................795
Conguring Rapid Spanning Tree................................................................................................................................ 795
Related Conguration Tasks...................................................................................................................................795
Important Points to Remember................................................................................................................................... 795
RSTP and VLT..........................................................................................................................................................796
Conguring Interfaces for Layer 2 Mode....................................................................................................................796
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................ 797
Adding and Removing Interfaces.................................................................................................................................799
Modifying Global Parameters....................................................................................................................................... 799
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 801
Modifying Interface Parameters...................................................................................................................................801
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 801
Inuencing RSTP Root Selection................................................................................................................................. 801
Conguring an EdgePort.............................................................................................................................................. 802
Conguring Fast Hellos for Link State Detection...................................................................................................... 803
46 Software-Dened Networking (SDN)......................................................................................................804
47 Security...................................................................................................................................................805
AAA Accounting............................................................................................................................................................ 805
Conguration Task List for AAA Accounting........................................................................................................805
AAA Authentication....................................................................................................................................................... 807
Conguration Task List for AAA Authentication.................................................................................................. 808
Obscuring Passwords and Keys.................................................................................................................................... 811
AAA Authorization...........................................................................................................................................................811
Privilege Levels Overview........................................................................................................................................ 811
Conguration Task List for Privilege Levels...........................................................................................................812
RADIUS............................................................................................................................................................................816
RADIUS Authentication........................................................................................................................................... 816
Conguration Task List for RADIUS....................................................................................................................... 817
Support for Change of Authorization and Disconnect Messages packets....................................................... 821
TACACS+........................................................................................................................................................................832
Conguration Task List for TACACS+................................................................................................................... 832
TACACS+ Remote Authentication.........................................................................................................................834
Command Authorization.........................................................................................................................................835
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................835
Enabling SCP and SSH................................................................................................................................................. 835
Using SCP with SSH to Copy a Software Image................................................................................................ 836
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................837
26
Contents