Administrator Guide

Protocol Overview.........................................................................................................................................................886
Conguring Rapid Spanning Tree................................................................................................................................ 886
Related Conguration Tasks...................................................................................................................................886
Important Points to Remember................................................................................................................................... 886
RSTP and VLT.......................................................................................................................................................... 887
Conguring Interfaces for Layer 2 Mode....................................................................................................................887
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................888
Adding and Removing Interfaces.................................................................................................................................890
Modifying Global Parameters....................................................................................................................................... 890
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 891
Modifying Interface Parameters.................................................................................................................................. 892
Inuencing RSTP Root Selection.................................................................................................................................892
Conguring an EdgePort.............................................................................................................................................. 893
Conguring Fast Hellos for Link State Detection...................................................................................................... 893
50 Security...................................................................................................................................................895
Role-Based Access Control..........................................................................................................................................895
Overview of RBAC.................................................................................................................................................. 895
User Roles................................................................................................................................................................ 898
AAA Authentication and Authorization for Roles................................................................................................. 901
Role Accounting.......................................................................................................................................................904
Display Information About User Roles...................................................................................................................905
AAA Accounting............................................................................................................................................................ 906
Conguration Task List for AAA Accounting........................................................................................................906
AAA Authentication.......................................................................................................................................................908
Conguration Task List for AAA Authentication.................................................................................................. 908
AAA Authorization..........................................................................................................................................................912
Privilege Levels Overview........................................................................................................................................912
Conguration Task List for Privilege Levels...........................................................................................................912
RADIUS............................................................................................................................................................................ 917
RADIUS Authentication and Authorization............................................................................................................917
Conguration Task List for RADIUS....................................................................................................................... 918
Support for Change of Authorization and Disconnect Messages packets...................................................... 922
TACACS+.........................................................................................................................................................................931
Conguration Task List for TACACS+....................................................................................................................931
TACACS+ Remote Authentication and Authorization.........................................................................................933
Command Authorization.........................................................................................................................................934
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 934
Enabling SCP and SSH................................................................................................................................................. 934
Using SCP with SSH to Copy a Software Image................................................................................................ 935
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 936
Conguring When to Re-generate an SSH Key ..................................................................................................936
Conguring the SSH Server Cipher List............................................................................................................... 937
Conguring DNS in the SSH Server......................................................................................................................937
Conguring the HMAC Algorithm for the SSH Server.......................................................................................938
Conguring the HMAC Algorithm for the SSH Client.........................................................................................938
28
Contents