Dell S4048–ON Configuration Manual page 25

Hide thumbs Also See for S4048–ON:
Table of Contents

Advertisement

Configuring Rapid Spanning Tree.................................................................................................................................782
Related Configuration Tasks................................................................................................................................... 782
Important Points to Remember....................................................................................................................................782
RSTP and VLT.......................................................................................................................................................... 783
Configuring Interfaces for Layer 2 Mode....................................................................................................................783
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................ 784
Adding and Removing Interfaces................................................................................................................................. 786
Modifying Global Parameters....................................................................................................................................... 786
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................788
Modifying Interface Parameters...................................................................................................................................788
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................788
Influencing RSTP Root Selection.................................................................................................................................788
Configuring an EdgePort.............................................................................................................................................. 789
Configuring Fast Hellos for Link State Detection...................................................................................................... 790
47 Software-Defined Networking (SDN)....................................................................................................... 791
48 Security................................................................................................................................................... 792
AAA Accounting.............................................................................................................................................................792
Configuration Task List for AAA Accounting........................................................................................................ 792
AAA Authentication....................................................................................................................................................... 794
Configuration Task List for AAA Authentication.................................................................................................. 795
Obscuring Passwords and Keys................................................................................................................................... 798
AAA Authorization......................................................................................................................................................... 798
Privilege Levels Overview....................................................................................................................................... 798
Configuration Task List for Privilege Levels.......................................................................................................... 799
RADIUS........................................................................................................................................................................... 803
RADIUS Authentication...........................................................................................................................................803
Configuration Task List for RADIUS...................................................................................................................... 804
TACACS+........................................................................................................................................................................808
Configuration Task List for TACACS+................................................................................................................... 808
TACACS+ Remote Authentication........................................................................................................................ 809
Command Authorization...........................................................................................................................................811
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................811
Enabling SCP and SSH................................................................................................................................................... 811
Using SCP with SSH to Copy a Software Image................................................................................................. 812
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 813
Configuring When to Re-generate an SSH Key .................................................................................................. 813
Configuring the SSH Server Key Exchange Algorithm........................................................................................ 814
Configuring the HMAC Algorithm for the SSH Server........................................................................................814
Configuring the HMAC Algorithm for the SSH Client......................................................................................... 815
Configuring the SSH Server Cipher List................................................................................................................815
Configuring the SSH Client Cipher List................................................................................................................. 816
Secure Shell Authentication.................................................................................................................................... 816
Troubleshooting SSH................................................................................................................................................819
Telnet................................................................................................................................................................................819
Contents
25

Advertisement

Table of Contents
loading

This manual is also suitable for:

S4048t-on

Table of Contents