Users Guide

Setting the RMON Alarm........................................................................................................................................867
Conguring an RMON Event................................................................................................................................. 868
Conguring RMON Collection Statistics.............................................................................................................. 868
Conguring the RMON Collection History........................................................................................................... 869
48 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 870
Protocol Overview......................................................................................................................................................... 870
Conguring Rapid Spanning Tree.................................................................................................................................870
Related Conguration Tasks................................................................................................................................... 870
Important Points to Remember....................................................................................................................................870
RSTP and VLT...........................................................................................................................................................871
Conguring Interfaces for Layer 2 Mode.....................................................................................................................871
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................ 872
Adding and Removing Interfaces................................................................................................................................. 874
Modifying Global Parameters........................................................................................................................................874
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................875
Modifying Interface Parameters...................................................................................................................................876
Inuencing RSTP Root Selection.................................................................................................................................876
Conguring an EdgePort...............................................................................................................................................877
Conguring Fast Hellos for Link State Detection.......................................................................................................877
49 Security................................................................................................................................................... 879
Role-Based Access Control.......................................................................................................................................... 879
Overview of RBAC.................................................................................................................................................. 880
User Roles.................................................................................................................................................................882
AAA Authentication and Authorization for Roles................................................................................................ 885
Role Accounting.......................................................................................................................................................888
Display Information About User Roles...................................................................................................................889
AAA Accounting.............................................................................................................................................................890
Conguration Task List for AAA Accounting........................................................................................................890
AAA Authentication....................................................................................................................................................... 892
Conguration Task List for AAA Authentication.................................................................................................. 892
AAA Authorization.........................................................................................................................................................896
Privilege Levels Overview.......................................................................................................................................896
Conguration Task List for Privilege Levels..........................................................................................................896
RADIUS............................................................................................................................................................................901
RADIUS Authentication and Authorization........................................................................................................... 901
Conguration Task List for RADIUS...................................................................................................................... 902
Support for Change of Authorization and Disconnect Messages packets...................................................... 906
TACACS+........................................................................................................................................................................ 915
Conguration Task List for TACACS+....................................................................................................................915
TACACS+ Remote Authentication and Authorization..........................................................................................917
Command Authorization..........................................................................................................................................918
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................918
Enabling SCP and SSH.................................................................................................................................................. 918
Using SCP with SSH to Copy a Software Image................................................................................................. 919
Contents
27