Users Guide
RADIUS........................................................................................................................................................................... 705
RADIUS Authentication...........................................................................................................................................705
Configuration Task List for RADIUS......................................................................................................................706
TACACS+....................................................................................................................................................................... 709
Configuration Task List for TACACS+..................................................................................................................709
TACACS+ Remote Authentication..........................................................................................................................711
Command Authorization..........................................................................................................................................712
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 712
Enabling SCP and SSH.................................................................................................................................................. 712
Using SCP with SSH to Copy a Software Image................................................................................................. 713
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................714
Configuring When to Re-generate an SSH Key .................................................................................................. 714
Configuring the SSH Server Key Exchange Algorithm........................................................................................715
Configuring the HMAC Algorithm for the SSH Server........................................................................................715
Configuring the HMAC Algorithm for the SSH Client......................................................................................... 716
Configuring the SSH Server Cipher List................................................................................................................717
Configuring the SSH Client Cipher List................................................................................................................. 717
Secure Shell Authentication....................................................................................................................................718
Troubleshooting SSH.............................................................................................................................................. 720
Telnet.............................................................................................................................................................................. 720
VTY Line and Access-Class Configuration..................................................................................................................721
VTY Line Local Authentication and Authorization................................................................................................721
VTY Line Remote Authentication and Authorization...........................................................................................722
VTY MAC-SA Filter Support.................................................................................................................................. 722
Role-Based Access Control..........................................................................................................................................722
Overview of RBAC.................................................................................................................................................. 723
User Roles.................................................................................................................................................................725
AAA Authentication and Authorization for Roles.................................................................................................729
Role Accounting........................................................................................................................................................731
Display Information About User Roles...................................................................................................................732
Two Factor Authentication (2FA)............................................................................................................................... 733
Handling Access-Challenge Message................................................................................................................... 734
Configuring Challenge Response Authentication for SSHv2............................................................................. 734
SMS-OTP Mechanism............................................................................................................................................ 734
Configuring the System to Drop Certain ICMP Reply Messages............................................................................735
45 Service Provider Bridging........................................................................................................................ 737
VLAN Stacking............................................................................................................................................................... 737
Important Points to Remember............................................................................................................................. 738
Configure VLAN Stacking.......................................................................................................................................738
Creating Access and Trunk Ports..........................................................................................................................739
Enable VLAN-Stacking for a VLAN.......................................................................................................................740
Configuring the Protocol Type Value for the Outer VLAN Tag.........................................................................740
Configuring Dell Networking OS Options for Trunk Ports................................................................................. 740
Debugging VLAN Stacking......................................................................................................................................741
VLAN Stacking in Multi-Vendor Networks...........................................................................................................742
Contents
23