Users Guide

TACACS+ Remote Authentication............................................................................... 834
Command Authorization................................................................................................835
Protection from TCP Tiny and Overlapping Fragment Attacks................................... 835
Enabling SCP and SSH.......................................................................................................... 835
Using SCP with SSH to Copy a Software Image........................................................836
Removing the RSA Host Keys and Zeroizing Storage ............................................. 838
Configuring When to Re-generate an SSH Key ........................................................838
Configuring the SSH Server Key Exchange Algorithm............................................. 838
Configuring the HMAC Algorithm for the SSH Server..............................................839
Configuring the SSH Server Cipher List...................................................................... 840
Secure Shell Authentication.......................................................................................... 840
Troubleshooting SSH...................................................................................................... 843
Telnet........................................................................................................................................843
VTY Line and Access-Class Configuration.......................................................................844
VTY Line Local Authentication and Authorization.................................................... 844
VTY Line Remote Authentication and Authorization................................................845
VTY MAC-SA Filter Support............................................................................................846
Role-Based Access Control.................................................................................................846
Overview of RBAC............................................................................................................847
User Roles..........................................................................................................................849
AAA Authentication and Authorization for Roles...................................................... 853
Role Accounting...............................................................................................................856
Display Information About User Roles.........................................................................857
48 Service Provider Bridging.................................................................................................859
VLAN Stacking.........................................................................................................................859
Important Points to Remember....................................................................................860
Configure VLAN Stacking............................................................................................... 861
Creating Access and Trunk Ports..................................................................................861
Enable VLAN-Stacking for a VLAN............................................................................... 862
Configuring the Protocol Type Value for the Outer VLAN Tag............................. 862
Configuring Dell Networking OS Options for Trunk Ports..................................... 863
Debugging VLAN Stacking.............................................................................................864
VLAN Stacking in Multi-Vendor Networks..................................................................864
VLAN Stacking Packet Drop Precedence......................................................................... 869
Enabling Drop Eligibility..................................................................................................869
Honoring the Incoming DEI Value............................................................................... 870
Marking Egress Packets with a DEI Value.................................................................... 871
Dynamic Mode CoS for VLAN Stacking.............................................................................872
Mapping C-Tag to S-Tag dot1p Values....................................................................... 873
Layer 2 Protocol Tunneling..................................................................................................874
Implementation Information..........................................................................................877
9.10(0.0)
26