Setup Guide

49 Rapid Spanning Tree Protocol (RSTP).....................................................................................................888
Protocol Overview.........................................................................................................................................................888
Conguring Rapid Spanning Tree................................................................................................................................ 888
Related Conguration Tasks...................................................................................................................................888
Important Points to Remember................................................................................................................................... 888
RSTP and VLT..........................................................................................................................................................889
Conguring Interfaces for Layer 2 Mode....................................................................................................................889
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................890
Adding and Removing Interfaces.................................................................................................................................892
Modifying Global Parameters....................................................................................................................................... 892
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................893
Modifying Interface Parameters.................................................................................................................................. 894
Inuencing RSTP Root Selection.................................................................................................................................894
Conguring an EdgePort.............................................................................................................................................. 895
Conguring Fast Hellos for Link State Detection...................................................................................................... 895
50 Security................................................................................................................................................... 897
Role-Based Access Control.......................................................................................................................................... 897
Overview of RBAC...................................................................................................................................................897
User Roles................................................................................................................................................................ 900
AAA Authentication and Authorization for Roles.................................................................................................903
Role Accounting.......................................................................................................................................................906
Display Information About User Roles...................................................................................................................907
AAA Accounting.............................................................................................................................................................908
Conguration Task List for AAA Accounting........................................................................................................908
RADIUS Accounting.................................................................................................................................................910
AAA Authentication........................................................................................................................................................915
Conguration Task List for AAA Authentication...................................................................................................915
AAA Authorization..........................................................................................................................................................919
Privilege Levels Overview........................................................................................................................................919
Conguration Task List for Privilege Levels...........................................................................................................919
RADIUS........................................................................................................................................................................... 924
RADIUS Authentication and Authorization...........................................................................................................924
Conguration Task List for RADIUS...................................................................................................................... 925
Support for Change of Authorization and Disconnect Messages packets...................................................... 929
TACACS+........................................................................................................................................................................938
Conguration Task List for TACACS+...................................................................................................................938
TACACS+ Remote Authentication and Authorization.........................................................................................940
Command Authorization..........................................................................................................................................941
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................941
Enabling SCP and SSH.................................................................................................................................................. 941
Using SCP with SSH to Copy a Software Image................................................................................................ 942
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 943
Conguring When to Re-generate an SSH Key ..................................................................................................943
Conguring the SSH Server Cipher List...............................................................................................................944
28
Contents