Users Guide

48 Rapid Spanning Tree Protocol (RSTP)....................................................... 888
Protocol Overview............................................................................................................................888
Configuring Rapid Spanning Tree....................................................................................................888
Related Configuration Tasks...................................................................................................... 888
Important Points to Remember.......................................................................................................888
RSTP and VLT..............................................................................................................................889
Configuring Interfaces for Layer 2 Mode........................................................................................ 889
Enabling Rapid Spanning Tree Protocol Globally........................................................................... 890
Adding and Removing Interfaces.....................................................................................................892
Modifying Global Parameters...........................................................................................................893
Enabling SNMP Traps for Root Elections and Topology Changes...........................................894
Modifying Interface Parameters.......................................................................................................894
Influencing RSTP Root Selection..................................................................................................... 895
Configuring an EdgePort..................................................................................................................895
Configuring Fast Hellos for Link State Detection............................................................................896
49 Security............................................................................................................898
Role-Based Access Control............................................................................................................. 898
Overview of RBAC...................................................................................................................... 898
User Roles....................................................................................................................................901
AAA Authentication and Authorization for Roles...................................................................... 905
Role Accounting......................................................................................................................... 907
Display Information About User Roles.......................................................................................908
AAA Accounting................................................................................................................................ 910
Configuration Task List for AAA Accounting..............................................................................910
AAA Authentication........................................................................................................................... 912
Configuration Task List for AAA Authentication.........................................................................912
AAA Authorization............................................................................................................................. 915
Privilege Levels Overview............................................................................................................915
Configuration Task List for Privilege Levels................................................................................916
RADIUS..............................................................................................................................................920
RADIUS Authentication and Authorization.................................................................................921
Configuration Task List for RADIUS............................................................................................922
TACACS+...........................................................................................................................................925
Configuration Task List for TACACS+........................................................................................925
TACACS+ Remote Authentication and Authorization...............................................................926
Command Authorization............................................................................................................928
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................928
Enabling SCP and SSH......................................................................................................................928
Using SCP with SSH to Copy a Software Image........................................................................929
Removing the RSA Host Keys and Zeroizing Storage .............................................................. 930
28