White Papers

Protocol Overview.........................................................................................................................................................864
Conguring Rapid Spanning Tree................................................................................................................................ 864
Related Conguration Tasks...................................................................................................................................864
Important Points to Remember................................................................................................................................... 864
RSTP and VLT..........................................................................................................................................................865
Conguring Interfaces for Layer 2 Mode................................................................................................................... 865
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................866
Adding and Removing Interfaces.................................................................................................................................868
Modifying Global Parameters....................................................................................................................................... 868
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................869
Modifying Interface Parameters...................................................................................................................................870
Inuencing RSTP Root Selection.................................................................................................................................870
Conguring an EdgePort............................................................................................................................................... 871
Conguring Fast Hellos for Link State Detection....................................................................................................... 871
49 Security................................................................................................................................................... 873
Role-Based Access Control.......................................................................................................................................... 873
Overview of RBAC...................................................................................................................................................874
User Roles.................................................................................................................................................................876
AAA Authentication and Authorization for Roles.................................................................................................879
Role Accounting.......................................................................................................................................................882
Display Information About User Roles...................................................................................................................883
AAA Accounting.............................................................................................................................................................884
Conguration Task List for AAA Accounting........................................................................................................884
AAA Authentication.......................................................................................................................................................886
Conguration Task List for AAA Authentication.................................................................................................. 886
AAA Authorization.........................................................................................................................................................890
Privilege Levels Overview.......................................................................................................................................890
Conguration Task List for Privilege Levels..........................................................................................................890
RADIUS...........................................................................................................................................................................895
RADIUS Authentication and Authorization...........................................................................................................895
Conguration Task List for RADIUS...................................................................................................................... 896
Support for Change of Authorization and Disconnect Messages packets...................................................... 900
TACACS+........................................................................................................................................................................909
Conguration Task List for TACACS+...................................................................................................................909
TACACS+ Remote Authentication and Authorization.......................................................................................... 911
Command Authorization..........................................................................................................................................912
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................912
Enabling SCP and SSH.................................................................................................................................................. 912
Using SCP with SSH to Copy a Software Image................................................................................................. 913
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 914
Conguring When to Re-generate an SSH Key .................................................................................................. 914
Conguring the SSH Server Cipher List................................................................................................................915
Conguring the HMAC Algorithm for the SSH Server........................................................................................915
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 916
Conguring the SSH Server Cipher List................................................................................................................916
Contents
27