45 Rapid Spanning Tree Protocol (RSTP)........................................................770
Protocol Overview............................................................................................................................770
Configuring Rapid Spanning Tree....................................................................................................770
Related Configuration Tasks.......................................................................................................770
Important Points to Remember..................................................................................................771
Configuring Interfaces for Layer 2 Mode..........................................................................................771
Enabling Rapid Spanning Tree Protocol Globally............................................................................771
Adding and Removing Interfaces.....................................................................................................774
Modifying Global Parameters...........................................................................................................775
Enable BPDU Filtering Globally.........................................................................................................776
Modifying Interface Parameters........................................................................................................777
Configuring an EdgePort..................................................................................................................778
Influencing RSTP Root Selection......................................................................................................779
SNMP Traps for Root Elections and Topology Changes.................................................................779
Configuring Fast Hellos for Link State Detection............................................................................779
46 Security............................................................................................................ 781
AAA Accounting.................................................................................................................................781
Configuration Task List for AAA Accounting..............................................................................781
AAA Authentication...........................................................................................................................783
Configuration Task List for AAA Authentication........................................................................784
AAA Authorization.............................................................................................................................786
Privilege Levels Overview...........................................................................................................786
Configuration Task List for Privilege Levels................................................................................787
RADIUS...............................................................................................................................................791
RADIUS Authentication and Authorization.................................................................................792
Configuration Task List for RADIUS............................................................................................793
TACACS+...........................................................................................................................................796
Configuration Task List for TACACS+........................................................................................796
Choosing TACACS+ as the Authentication Method..................................................................796
Monitoring TACACS+..................................................................................................................798
TACACS+ Remote Authentication and Authorization...............................................................798
Specifying a TACACS+ Server Host............................................................................................799
Command Authorization............................................................................................................799
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................800
Enabling SCP and SSH......................................................................................................................800
Using SCP with SSH to Copy a Software Image........................................................................801
Removing the RSA Host Keys and Zeroizing Storage ..............................................................802
Configuring When to Re-generate an SSH Key ........................................................................802
Configuring the SSH Server Key Exchange Algorithm..............................................................803
Configuring the HMAC Algorithm for the SSH Server...............................................................803
24