Users Guide

Setting the RMON Alarm........................................................................................................................................687
Conguring an RMON Event..................................................................................................................................687
Conguring RMON Collection Statistics.............................................................................................................. 688
Conguring the RMON Collection History........................................................................................................... 688
42 Rapid Spanning Tree Protocol (RSTP).....................................................................................................690
Protocol Overview.........................................................................................................................................................690
Conguring Rapid Spanning Tree................................................................................................................................ 690
Related Conguration Tasks...................................................................................................................................690
Important Points to Remember................................................................................................................................... 690
RSTP and VLT...........................................................................................................................................................691
Conguring Interfaces for Layer 2 Mode.................................................................................................................... 691
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................ 691
Adding and Removing Interfaces.................................................................................................................................694
Modifying Global Parameters....................................................................................................................................... 694
Enabling SNMP Traps for Root Elections and Topology Changes.................................................................... 695
Modifying Interface Parameters.................................................................................................................................. 695
Enabling SNMP Traps for Root Elections and Topology Changes.......................................................................... 696
Inuencing RSTP Root Selection.................................................................................................................................696
Conguring an EdgePort.............................................................................................................................................. 696
Conguring Fast Hellos for Link State Detection.......................................................................................................697
43 Software-Dened Networking (SDN)...................................................................................................... 698
44 Security...................................................................................................................................................699
AAA Accounting.............................................................................................................................................................699
Conguration Task List for AAA Accounting........................................................................................................699
AAA Authentication........................................................................................................................................................701
Conguration Task List for AAA Authentication.................................................................................................. 702
Obscuring Passwords and Keys...................................................................................................................................704
AAA Authorization......................................................................................................................................................... 704
Privilege Levels Overview....................................................................................................................................... 704
Conguration Task List for Privilege Levels..........................................................................................................705
RADIUS........................................................................................................................................................................... 709
RADIUS Authentication...........................................................................................................................................709
Conguration Task List for RADIUS....................................................................................................................... 710
TACACS+.........................................................................................................................................................................713
Conguration Task List for TACACS+....................................................................................................................713
TACACS+ Remote Authentication......................................................................................................................... 714
Command Authorization..........................................................................................................................................715
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................716
Enabling SCP and SSH.................................................................................................................................................. 716
Using SCP with SSH to Copy a Software Image..................................................................................................717
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 718
Conguring When to Re-generate an SSH Key ...................................................................................................718
Conguring the SSH Server Key Exchange Algorithm........................................................................................718
Conguring the HMAC Algorithm for the SSH Server........................................................................................719
Contents
23