41 Rapid Spanning Tree Protocol (RSTP)........................................................786
Protocol Overview............................................................................................................................786
Configuring Rapid Spanning Tree....................................................................................................786
Related Configuration Tasks.......................................................................................................786
Important Points to Remember........................................................................................................787
RSTP and VLT..............................................................................................................................787
Configuring Interfaces for Layer 2 Mode.........................................................................................787
Enabling Rapid Spanning Tree Protocol Globally............................................................................788
Adding and Removing Interfaces.....................................................................................................790
Modifying Global Parameters...........................................................................................................791
Enabling SNMP Traps for Root Elections and Topology Changes...........................................792
Modifying Interface Parameters.......................................................................................................792
Enabling SNMP Traps for Root Elections and Topology Changes.................................................793
Influencing RSTP Root Selection......................................................................................................793
Configuring an EdgePort..................................................................................................................793
Configuring Fast Hellos for Link State Detection............................................................................794
42 Software-Defined Networking (SDN).........................................................79643 Security............................................................................................................ 797
AAA Accounting................................................................................................................................797
Configuration Task List for AAA Accounting..............................................................................797
AAA Authentication...........................................................................................................................799
Configuration Task List for AAA Authentication........................................................................800
Obscuring Passwords and Keys.......................................................................................................802
AAA Authorization.............................................................................................................................803
Privilege Levels Overview...........................................................................................................803
Configuration Task List for Privilege Levels...............................................................................804
RADIUS..............................................................................................................................................808
RADIUS Authentication...............................................................................................................808
Configuration Task List for RADIUS...........................................................................................809
TACACS+...........................................................................................................................................812
Configuration Task List for TACACS+........................................................................................812
TACACS+ Remote Authentication.............................................................................................814
Command Authorization............................................................................................................815
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................816
Enabling SCP and SSH......................................................................................................................816
Using SCP with SSH to Copy a Software Image.........................................................................817
Removing the RSA Host Keys and Zeroizing Storage ...............................................................817
Configuring When to Re-generate an SSH Key ........................................................................817
Configuring the SSH Server Key Exchange Algorithm...............................................................818
25