45 Rapid Spanning Tree Protocol (RSTP)........................................................770
Protocol Overview............................................................................................................................ 770
Configuring Rapid Spanning Tree.................................................................................................... 770
Related Configuration Tasks.......................................................................................................770
Important Points to Remember.................................................................................................. 771
Configuring Interfaces for Layer 2 Mode..........................................................................................771
Enabling Rapid Spanning Tree Protocol Globally............................................................................ 771
Adding and Removing Interfaces..................................................................................................... 774
Modifying Global Parameters........................................................................................................... 775
Enable BPDU Filtering Globally.........................................................................................................776
Modifying Interface Parameters........................................................................................................777
Configuring an EdgePort.................................................................................................................. 778
Influencing RSTP Root Selection......................................................................................................779
SNMP Traps for Root Elections and Topology Changes.................................................................779
Configuring Fast Hellos for Link State Detection............................................................................ 779
46 Security............................................................................................................ 781
AAA Accounting.................................................................................................................................781
Configuration Task List for AAA Accounting.............................................................................. 781
AAA Authentication...........................................................................................................................783
Configuration Task List for AAA Authentication........................................................................ 784
AAA Authorization.............................................................................................................................786
Privilege Levels Overview........................................................................................................... 786
Configuration Task List for Privilege Levels................................................................................787
RADIUS...............................................................................................................................................791
RADIUS Authentication and Authorization.................................................................................792
Configuration Task List for RADIUS............................................................................................793
TACACS+...........................................................................................................................................796
Configuration Task List for TACACS+........................................................................................796
Choosing TACACS+ as the Authentication Method..................................................................796
Monitoring TACACS+..................................................................................................................798
TACACS+ Remote Authentication and Authorization...............................................................798
Specifying a TACACS+ Server Host............................................................................................799
Command Authorization............................................................................................................799
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................800
Enabling SCP and SSH......................................................................................................................800
Using SCP with SSH to Copy a Software Image........................................................................ 801
Removing the RSA Host Keys and Zeroizing Storage .............................................................. 802
Configuring When to Re-generate an SSH Key ........................................................................802
Configuring the SSH Server Key Exchange Algorithm.............................................................. 803
Configuring the HMAC Algorithm for the SSH Server...............................................................803
24