Users Guide

Configuration Task List for AAA Authentication........................................................................................ 826
AAA Authorization..................................................................................................................................................829
Privilege Levels Overview............................................................................................................................... 829
Configuration Task List for Privilege Levels................................................................................................829
RADIUS..................................................................................................................................................................... 834
RADIUS Authentication and Authorization................................................................................................. 834
Configuration Task List for RADIUS..............................................................................................................835
TACACS+................................................................................................................................................................. 838
Configuration Task List for TACACS+..........................................................................................................838
TACACS+ Remote Authentication and Authorization............................................................................. 840
Command Authorization................................................................................................................................ 841
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................841
Enabling SCP and SSH...........................................................................................................................................841
Using SCP with SSH to Copy a Software Image........................................................................................842
Removing the RSA Host Keys and Zeroizing Storage ............................................................................. 843
Configuring When to Re-generate an SSH Key ........................................................................................843
Configuring the SSH Server Cipher List.......................................................................................................844
Configuring the HMAC Algorithm for the SSH Server..............................................................................844
Configuring the HMAC Algorithm for the SSH Client.............................................................................. 845
Configuring the SSH Server Cipher List.......................................................................................................845
Configuring the SSH Client Cipher List....................................................................................................... 846
Secure Shell Authentication...........................................................................................................................846
Troubleshooting SSH...................................................................................................................................... 849
Telnet........................................................................................................................................................................849
VTY Line and Access-Class Configuration....................................................................................................... 849
VTY Line Local Authentication and Authorization.................................................................................... 850
VTY Line Remote Authentication and Authorization................................................................................850
VTY MAC-SA Filter Support............................................................................................................................ 851
50 Service Provider Bridging................................................................................................................................852
VLAN Stacking.........................................................................................................................................................852
Important Points to Remember.................................................................................................................... 853
Configure VLAN Stacking............................................................................................................................... 854
Creating Access and Trunk Ports..................................................................................................................854
Enable VLAN-Stacking for a VLAN................................................................................................................855
Configuring the Protocol Type Value for the Outer VLAN Tag..............................................................855
Configuring Options for Trunk Ports........................................................................................................... 855
Debugging VLAN Stacking............................................................................................................................. 856
VLAN Stacking in Multi-Vendor Networks.................................................................................................. 857
VLAN Stacking Packet Drop Precedence......................................................................................................... 860
Enabling Drop Eligibility..................................................................................................................................860
Honoring the Incoming DEI Value................................................................................................................861
Marking Egress Packets with a DEI Value................................................................................................... 862
Dynamic Mode CoS for VLAN Stacking............................................................................................................ 862
Mapping C-Tag to S-Tag dot1p Values.......................................................................................................863
Layer 2 Protocol Tunneling................................................................................................................................. 864
Implementation Information......................................................................................................................... 866
Version 9.10(0.1)
26