Protocol Overview............................................................................................................................760
Configuring Rapid Spanning Tree....................................................................................................760
Related Configuration Tasks.......................................................................................................760
Important Points to Remember........................................................................................................761
RSTP and VLT...............................................................................................................................761
Configuring Interfaces for Layer 2 Mode......................................................................................... 761
Enabling Rapid Spanning Tree Protocol Globally............................................................................762
Adding and Removing Interfaces.....................................................................................................764
Modifying Global Parameters........................................................................................................... 765
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 766
Modifying Interface Parameters....................................................................................................... 766
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 767
Influencing RSTP Root Selection......................................................................................................767
Configuring an EdgePort.................................................................................................................. 767
Configuring Fast Hellos for Link State Detection............................................................................ 768
42 Software-Defined Networking (SDN).........................................................770
43 Security.............................................................................................................771
AAA Accounting.................................................................................................................................771
Configuration Task List for AAA Accounting.............................................................................. 771
AAA Authentication........................................................................................................................... 773
Configuration Task List for AAA Authentication.........................................................................774
Obscuring Passwords and Keys........................................................................................................776
AAA Authorization..............................................................................................................................777
Privilege Levels Overview............................................................................................................777
Configuration Task List for Privilege Levels................................................................................777
RADIUS...............................................................................................................................................781
RADIUS Authentication............................................................................................................... 782
Configuration Task List for RADIUS............................................................................................783
TACACS+...........................................................................................................................................786
Configuration Task List for TACACS+........................................................................................786
TACACS+ Remote Authentication............................................................................................. 788
Command Authorization............................................................................................................789
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 789
Enabling SCP and SSH...................................................................................................................... 789
Using SCP with SSH to Copy a Software Image........................................................................790
Removing the RSA Host Keys and Zeroizing Storage ............................................................... 791
Configuring When to Re-generate an SSH Key ........................................................................792
Configuring the SSH Server Key Exchange Algorithm...............................................................792
Configuring the HMAC Algorithm for the SSH Server...............................................................793
Configuring the SSH Server Cipher List......................................................................................793
25