Users Guide

Configuration Task List for TACACS+..........................................................................................................694
TACACS+ Remote Authentication............................................................................................................... 696
Command Authorization................................................................................................................................697
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................697
Enabling SCP and SSH...........................................................................................................................................697
Using SCP with SSH to Copy a Software Image........................................................................................698
Removing the RSA Host Keys and Zeroizing Storage ............................................................................. 699
Configuring When to Re-generate an SSH Key ....................................................................................... 699
Configuring the SSH Server Key Exchange Algorithm............................................................................. 700
Configuring the HMAC Algorithm for the SSH Server..............................................................................700
Configuring the SSH Server Cipher List....................................................................................................... 701
Secure Shell Authentication........................................................................................................................... 701
Troubleshooting SSH.......................................................................................................................................704
Telnet........................................................................................................................................................................704
VTY Line and Access-Class Configuration....................................................................................................... 704
VTY Line Local Authentication and Authorization.....................................................................................705
VTY Line Remote Authentication and Authorization................................................................................705
VTY MAC-SA Filter Support............................................................................................................................706
Role-Based Access Control.................................................................................................................................706
Overview of RBAC............................................................................................................................................ 707
User Roles.......................................................................................................................................................... 709
AAA Authentication and Authorization for Roles....................................................................................... 712
Role Accounting................................................................................................................................................715
Display Information About User Roles......................................................................................................... 716
47 Service Provider Bridging................................................................................................................................ 718
VLAN Stacking......................................................................................................................................................... 718
Important Points to Remember.....................................................................................................................719
Configure VLAN Stacking............................................................................................................................... 720
Creating Access and Trunk Ports..................................................................................................................720
Enable VLAN-Stacking for a VLAN................................................................................................................ 721
Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................. 721
Configuring Dell Networking OS Options for Trunk Ports...................................................................... 721
Debugging VLAN Stacking..............................................................................................................................722
VLAN Stacking in Multi-Vendor Networks.................................................................................................. 723
VLAN Stacking Packet Drop Precedence.......................................................................................................... 727
Enabling Drop Eligibility...................................................................................................................................727
Honoring the Incoming DEI Value................................................................................................................728
Marking Egress Packets with a DEI Value....................................................................................................728
Dynamic Mode CoS for VLAN Stacking.............................................................................................................729
Mapping C-Tag to S-Tag dot1p Values....................................................................................................... 730
Layer 2 Protocol Tunneling.................................................................................................................................. 731
Implementation Information..........................................................................................................................733
Enabling Layer 2 Protocol Tunneling........................................................................................................... 733
Specifying a Destination MAC Address for BPDUs....................................................................................734
Setting Rate-Limit BPDUs...............................................................................................................................734
Debugging Layer 2 Protocol Tunneling.......................................................................................................735
Contents
23