Service Manual
RADIUS...........................................................................................................................................................................651
RADIUS Authentication............................................................................................................................................652
Conguration Task List for RADIUS..........................................................................................................................652
TACACS+...................................................................................................................................................................... 655
Conguration Task List for TACACS+...................................................................................................................... 655
TACACS+ Remote Authentication........................................................................................................................... 656
Command Authorization...........................................................................................................................................657
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................................658
Enabling SCP and SSH.................................................................................................................................................. 658
Using SCP with SSH to Copy a Software Image......................................................................................................659
Removing the RSA Host Keys and Zeroizing Storage ..............................................................................................659
Conguring When to Re-generate an SSH Key .......................................................................................................659
Conguring the SSH Server Key Exchange Algorithm............................................................................................. 660
Conguring the HMAC Algorithm for the SSH Server............................................................................................. 660
Conguring the SSH Server Cipher List....................................................................................................................661
Secure Shell Authentication......................................................................................................................................661
Troubleshooting SSH................................................................................................................................................664
Telnet............................................................................................................................................................................. 664
VTY Line and Access-Class Conguration......................................................................................................................664
VTY Line Local Authentication and Authorization.....................................................................................................664
VTY Line Remote Authentication and Authorization................................................................................................ 665
VTY MAC-SA Filter Support.................................................................................................................................... 665
Role-Based Access Control............................................................................................................................................666
Overview of RBAC...................................................................................................................................................666
User Roles................................................................................................................................................................668
AAA Authentication and Authorization for Roles...................................................................................................... 672
Role Accounting....................................................................................................................................................... 674
Display Information About User Roles.......................................................................................................................675
46 Service Provider Bridging.......................................................................................... 677
VLAN Stacking............................................................................................................................................................... 677
Important Points to Remember................................................................................................................................ 678
Congure VLAN Stacking.........................................................................................................................................678
Creating Access and Trunk Ports............................................................................................................................. 679
Enable VLAN-Stacking for a VLAN.......................................................................................................................... 679
Conguring the Protocol Type Value for the Outer VLAN Tag..................................................................................680
Conguring Dell Networking OS Options for Trunk Ports.........................................................................................680
Debugging VLAN Stacking........................................................................................................................................681
VLAN Stacking in Multi-Vendor Networks................................................................................................................ 681
VLAN Stacking Packet Drop Precedence.......................................................................................................................686
Enabling Drop Eligibility............................................................................................................................................ 686
Honoring the Incoming DEI Value.............................................................................................................................686
Marking Egress Packets with a DEI Value.................................................................................................................687
Dynamic Mode CoS for VLAN Stacking.........................................................................................................................688
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................... 689
Layer 2 Protocol Tunneling.............................................................................................................................................690
23