Dell S6000-ON Switch User Manual


  Open as PDF
of 1100
 
41 Rapid Spanning Tree Protocol (RSTP)........................................................786
Protocol Overview............................................................................................................................786
Configuring Rapid Spanning Tree....................................................................................................786
Related Configuration Tasks.......................................................................................................786
Important Points to Remember........................................................................................................787
RSTP and VLT.............................................................................................................................. 787
Configuring Interfaces for Layer 2 Mode.........................................................................................787
Enabling Rapid Spanning Tree Protocol Globally............................................................................788
Adding and Removing Interfaces.....................................................................................................790
Modifying Global Parameters........................................................................................................... 791
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 792
Modifying Interface Parameters....................................................................................................... 792
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 793
Influencing RSTP Root Selection......................................................................................................793
Configuring an EdgePort.................................................................................................................. 793
Configuring Fast Hellos for Link State Detection............................................................................ 794
42 Software-Defined Networking (SDN).........................................................796
43 Security............................................................................................................ 797
AAA Accounting................................................................................................................................ 797
Configuration Task List for AAA Accounting..............................................................................797
AAA Authentication...........................................................................................................................799
Configuration Task List for AAA Authentication........................................................................800
Obscuring Passwords and Keys....................................................................................................... 802
AAA Authorization.............................................................................................................................803
Privilege Levels Overview........................................................................................................... 803
Configuration Task List for Privilege Levels...............................................................................804
RADIUS..............................................................................................................................................808
RADIUS Authentication...............................................................................................................808
Configuration Task List for RADIUS........................................................................................... 809
TACACS+...........................................................................................................................................812
Configuration Task List for TACACS+........................................................................................ 812
TACACS+ Remote Authentication............................................................................................. 814
Command Authorization............................................................................................................ 815
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 816
Enabling SCP and SSH...................................................................................................................... 816
Using SCP with SSH to Copy a Software Image.........................................................................817
Removing the RSA Host Keys and Zeroizing Storage ............................................................... 817
Configuring When to Re-generate an SSH Key ........................................................................ 817
Configuring the SSH Server Key Exchange Algorithm...............................................................818
25