Users Guide

42 Remote Monitoring (RMON)................................................................................................................... 732
Implementation Information..........................................................................................................................................732
Fault Recovery............................................................................................................................................................... 732
Setting the RMON Alarm........................................................................................................................................733
Conguring an RMON Event..................................................................................................................................733
Conguring RMON Collection Statistics...............................................................................................................734
Conguring the RMON Collection History........................................................................................................... 734
43 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 736
Protocol Overview......................................................................................................................................................... 736
Conguring Rapid Spanning Tree.................................................................................................................................736
Related Conguration Tasks................................................................................................................................... 736
Important Points to Remember....................................................................................................................................736
RSTP and VLT.......................................................................................................................................................... 737
Conguring Interfaces for Layer 2 Mode.................................................................................................................... 737
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................738
Adding and Removing Interfaces................................................................................................................................. 740
Modifying Global Parameters....................................................................................................................................... 740
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 742
Modifying Interface Parameters...................................................................................................................................742
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 742
Inuencing RSTP Root Selection................................................................................................................................. 743
Conguring an EdgePort...............................................................................................................................................743
Conguring Fast Hellos for Link State Detection.......................................................................................................744
44 Software-Dened Networking (SDN)...................................................................................................... 745
45 Security................................................................................................................................................... 746
AAA Accounting.............................................................................................................................................................746
Conguration Task List for AAA Accounting........................................................................................................ 746
AAA Authentication....................................................................................................................................................... 748
Conguration Task List for AAA Authentication...................................................................................................749
Obscuring Passwords and Keys...................................................................................................................................752
AAA Authorization......................................................................................................................................................... 752
Privilege Levels Overview.......................................................................................................................................752
Conguration Task List for Privilege Levels.......................................................................................................... 753
RADIUS............................................................................................................................................................................757
RADIUS Authentication........................................................................................................................................... 757
Conguration Task List for RADIUS.......................................................................................................................758
TACACS+........................................................................................................................................................................762
Conguration Task List for TACACS+................................................................................................................... 762
TACACS+ Remote Authentication.........................................................................................................................763
Command Authorization......................................................................................................................................... 764
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 765
Enabling SCP and SSH................................................................................................................................................. 765
24
Contents