8 CHAPTER : CONTENTSIntroduction to the Protection Functions 185Prerequisites 186Configuring BPDU Protection 187Configuring Root Protection 187Configuring Loop Prevention 188Configuring TC-BPDU Attack Prevention 188BPDU Tunnel Configuration 188Introduction to BPDU Tunnel 188Configuring BPDU Tunnel 189Displaying and Debugging MSTP 190MSTP Configuration Example 190BPDU Tunnel Configuration Example 19214 C ENTRALIZED MAC ADDRESS A UTHENTICATION C ONFIGURATIONIntroduction to Centralized MAC Address Authentication 195Centralized MAC Address Authentication Configuration 196Enabling Global/Port-based Centralized MAC Address Authentication 196Configuring an ISP Domain for MAC Address Authentication Users 196Setting Centralized MAC Address Authentication Timers 196Displaying and Debugging Centralized MAC Address Authentication 197Centralized MAC Address Authentication Configuration Example 19715 SSH TERMINAL SERVICESSSH Terminal Services 199Introduction to SSH 199SSH Server Configuration 201SSH Client Configuration 205Displaying SSH Configuration 205SSH Server Configuration Example 206SSH Client Configuration Example 207SSH Keygen Program 209SFTP Service 210SFTP Overview 210SFTP Server Configuration 210SFTP Client Configuration 211SFTP Configuration Example 21316 IP ROUTING PROTOCOL O PERATIONIP Routing Protocol Overview 217Selecting Routes Through the Routing Table 218Routing Management Policy 219Static Routes 220Configuring Static Routes 221Example: Typical Static Route Configuration 223Troubleshooting Static Routes 224RIP 224Configuring RIP 225Traffic Sharing Across RIP Interfaces 233