Users Guide

AAA Authentication.......................................................................................................................................................650
Conguration Task List for AAA Authentication...................................................................................................651
Obscuring Passwords and Keys...................................................................................................................................653
AAA Authorization......................................................................................................................................................... 653
Privilege Levels Overview.......................................................................................................................................653
Conguration Task List for Privilege Levels..........................................................................................................654
RADIUS...........................................................................................................................................................................658
RADIUS Authentication.......................................................................................................................................... 658
Conguration Task List for RADIUS...................................................................................................................... 659
TACACS+........................................................................................................................................................................662
Conguration Task List for TACACS+...................................................................................................................662
TACACS+ Remote Authentication........................................................................................................................ 663
Command Authorization.........................................................................................................................................664
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................665
Enabling SCP and SSH................................................................................................................................................. 665
Using SCP with SSH to Copy a Software Image................................................................................................ 666
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................667
Conguring When to Re-generate an SSH Key ..................................................................................................667
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 667
Conguring the HMAC Algorithm for the SSH Server.......................................................................................668
Conguring the HMAC Algorithm for the SSH Client........................................................................................ 668
Conguring the SSH Server Cipher List...............................................................................................................669
Conguring the SSH Client Cipher List................................................................................................................ 669
Secure Shell Authentication................................................................................................................................... 670
Troubleshooting SSH............................................................................................................................................... 672
Telnet............................................................................................................................................................................... 673
VTY Line and Access-Class Conguration................................................................................................................. 673
VTY Line Local Authentication and Authorization............................................................................................... 673
VTY Line Remote Authentication and Authorization........................................................................................... 674
VTY MAC-SA Filter Support...................................................................................................................................674
Role-Based Access Control..........................................................................................................................................675
Overview of RBAC...................................................................................................................................................675
User Roles.................................................................................................................................................................677
AAA Authentication and Authorization for Roles................................................................................................ 680
Role Accounting.......................................................................................................................................................683
Display Information About User Roles...................................................................................................................684
45 Service Provider Bridging........................................................................................................................ 686
VLAN Stacking...............................................................................................................................................................686
Important Points to Remember..............................................................................................................................687
Congure VLAN Stacking.......................................................................................................................................687
Creating Access and Trunk Ports.......................................................................................................................... 688
Enable VLAN-Stacking for a VLAN.......................................................................................................................688
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................689
Conguring Dell Networking OS Options for Trunk Ports..................................................................................689
Debugging VLAN Stacking.....................................................................................................................................690
VLAN Stacking in Multi-Vendor Networks...........................................................................................................690
22
Contents