Protocol Overview............................................................................................................................760Configuring Rapid Spanning Tree.................................................................................................... 760Related Configuration Tasks.......................................................................................................760Important Points to Remember........................................................................................................761RSTP and VLT...............................................................................................................................761Configuring Interfaces for Layer 2 Mode......................................................................................... 761Enabling Rapid Spanning Tree Protocol Globally............................................................................762Adding and Removing Interfaces..................................................................................................... 764Modifying Global Parameters........................................................................................................... 765Enabling SNMP Traps for Root Elections and Topology Changes........................................... 766Modifying Interface Parameters....................................................................................................... 766Enabling SNMP Traps for Root Elections and Topology Changes................................................. 767Influencing RSTP Root Selection......................................................................................................767Configuring an EdgePort.................................................................................................................. 767Configuring Fast Hellos for Link State Detection............................................................................ 76842 Software-Defined Networking (SDN).........................................................77043 Security.............................................................................................................771AAA Accounting................................................................................................................................. 771Configuration Task List for AAA Accounting.............................................................................. 771AAA Authentication........................................................................................................................... 773Configuration Task List for AAA Authentication.........................................................................774Obscuring Passwords and Keys........................................................................................................776AAA Authorization..............................................................................................................................777Privilege Levels Overview............................................................................................................ 777Configuration Task List for Privilege Levels................................................................................777RADIUS...............................................................................................................................................781RADIUS Authentication............................................................................................................... 782Configuration Task List for RADIUS............................................................................................783TACACS+...........................................................................................................................................786Configuration Task List for TACACS+........................................................................................ 786TACACS+ Remote Authentication............................................................................................. 788Command Authorization............................................................................................................ 789Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 789Enabling SCP and SSH...................................................................................................................... 789Using SCP with SSH to Copy a Software Image........................................................................790Removing the RSA Host Keys and Zeroizing Storage ............................................................... 791Configuring When to Re-generate an SSH Key ........................................................................ 792Configuring the SSH Server Key Exchange Algorithm...............................................................792Configuring the HMAC Algorithm for the SSH Server............................................................... 793Configuring the SSH Server Cipher List......................................................................................79325