Service Manual

Conguring Interfaces for Layer 2 Mode........................................................................................................................658
Enabling Rapid Spanning Tree Protocol Globally.............................................................................................................659
Adding and Removing Interfaces.................................................................................................................................... 661
Modifying Global Parameters..........................................................................................................................................661
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................662
Modifying Interface Parameters..................................................................................................................................... 663
Enabling SNMP Traps for Root Elections and Topology Changes...................................................................................663
Inuencing RSTP Root Selection................................................................................................................................... 663
Conguring an EdgePort................................................................................................................................................664
Conguring Fast Hellos for Link State Detection............................................................................................................665
42 Software-Dened Networking (SDN)....................................................................... 666
43 Security.....................................................................................................................667
AAA Accounting.............................................................................................................................................................667
Conguration Task List for AAA Accounting.............................................................................................................667
AAA Authentication....................................................................................................................................................... 669
Conguration Task List for AAA Authentication....................................................................................................... 669
Obscuring Passwords and Keys...................................................................................................................................... 671
AAA Authorization..........................................................................................................................................................672
Privilege Levels Overview.........................................................................................................................................672
Conguration Task List for Privilege Levels...............................................................................................................673
RADIUS..........................................................................................................................................................................676
RADIUS Authentication............................................................................................................................................ 677
Conguration Task List for RADIUS.......................................................................................................................... 677
TACACS+.......................................................................................................................................................................680
Conguration Task List for TACACS+.......................................................................................................................680
TACACS+ Remote Authentication............................................................................................................................ 681
Command Authorization.......................................................................................................................................... 682
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................................683
Enabling SCP and SSH...................................................................................................................................................683
Using SCP with SSH to Copy a Software Image......................................................................................................684
Removing the RSA Host Keys and Zeroizing Storage ..............................................................................................684
Conguring When to Re-generate an SSH Key .......................................................................................................684
Conguring the SSH Server Key Exchange Algorithm............................................................................................. 685
Conguring the HMAC Algorithm for the SSH Server............................................................................................. 685
Conguring the SSH Server Cipher List...................................................................................................................686
Secure Shell Authentication..................................................................................................................................... 686
Troubleshooting SSH................................................................................................................................................689
Telnet.............................................................................................................................................................................689
VTY Line and Access-Class Conguration......................................................................................................................689
VTY Line Local Authentication and Authorization.....................................................................................................689
VTY Line Remote Authentication and Authorization................................................................................................ 690
VTY MAC-SA Filter Support.................................................................................................................................... 690
Role-Based Access Control.............................................................................................................................................691
Overview of RBAC....................................................................................................................................................691
23