Deployment Guide

48 Rapid Spanning Tree Protocol (RSTP).....................................................................................................684
Protocol Overview.........................................................................................................................................................684
Conguring Rapid Spanning Tree................................................................................................................................ 684
Related Conguration Tasks...................................................................................................................................684
Important Points to Remember............................................................................................................................. 684
Conguring Interfaces for Layer 2 Mode................................................................................................................... 685
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................685
Adding and Removing Interfaces................................................................................................................................. 687
Modifying Global Parameters....................................................................................................................................... 688
Enable BPDU Filtering Globally.................................................................................................................................... 689
Modifying Interface Parameters.................................................................................................................................. 689
Conguring an EdgePort.............................................................................................................................................. 690
Inuencing RSTP Root Selection................................................................................................................................. 691
SNMP Traps for Root Elections and Topology Changes........................................................................................... 691
Conguring Fast Hellos for Link State Detection....................................................................................................... 691
49 Security...................................................................................................................................................693
Supported Modes..........................................................................................................................................................693
Understanding Banner Settings...................................................................................................................................693
Accessing the I/O Aggregator Using the CMC Console Only................................................................................. 694
AAA Accounting.............................................................................................................................................................694
Conguration Task List for AAA Accounting........................................................................................................694
AAA Authentication.......................................................................................................................................................696
Conguration Task List for AAA Authentication.................................................................................................. 696
AAA Authorization.........................................................................................................................................................699
Privilege Levels Overview.......................................................................................................................................700
Conguration Task List for Privilege Levels..........................................................................................................700
RADIUS........................................................................................................................................................................... 704
RADIUS Authentication and Authorization...........................................................................................................704
Conguration Task List for RADIUS.......................................................................................................................706
TACACS+........................................................................................................................................................................708
Conguration Task List for TACACS+................................................................................................................... 708
TACACS+ Remote Authentication......................................................................................................................... 710
Enabling SCP and SSH...................................................................................................................................................711
Using SCP with SSH to Copy a Software Image................................................................................................. 712
Secure Shell Authentication.................................................................................................................................... 713
Conguring the HMAC Algorithm for the SSH Client..........................................................................................713
Conguring the SSH Client Cipher List................................................................................................................. 713
Telnet................................................................................................................................................................................714
VTY Line and Access-Class Conguration.................................................................................................................. 714
VTY Line Local Authentication and Authorization................................................................................................714
VTY Line Remote Authentication and Authorization........................................................................................... 715
Role-Based Access Control...........................................................................................................................................715
Overview of RBAC................................................................................................................................................... 716
User Roles................................................................................................................................................................. 718
Contents
23