Service Manual

Table Of Contents
Obscuring Passwords and Keys....................................................................................................... 846
AAA Authorization.............................................................................................................................847
Privilege Levels Overview........................................................................................................... 847
Configuration Task List for Privilege Levels............................................................................... 847
RADIUS...............................................................................................................................................851
RADIUS Authentication...............................................................................................................852
Configuration Task List for RADIUS............................................................................................853
TACACS+.......................................................................................................................................... 856
Configuration Task List for TACACS+........................................................................................856
TACACS+ Remote Authentication............................................................................................. 858
Command Authorization............................................................................................................859
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 859
Enabling SCP and SSH......................................................................................................................859
Using SCP with SSH to Copy a Software Image........................................................................860
Removing the RSA Host Keys and Zeroizing Storage ...............................................................861
Configuring When to Re-generate an SSH Key ........................................................................862
Configuring the SSH Server Key Exchange Algorithm.............................................................. 862
Configuring the HMAC Algorithm for the SSH Server...............................................................863
Configuring the SSH Server Cipher List..................................................................................... 863
Secure Shell Authentication....................................................................................................... 864
Troubleshooting SSH..................................................................................................................866
Telnet.................................................................................................................................................867
VTY Line and Access-Class Configuration...................................................................................... 867
VTY Line Local Authentication and Authorization.....................................................................867
VTY Line Remote Authentication and Authorization................................................................ 868
VTY MAC-SA Filter Support........................................................................................................ 869
Role-Based Access Control............................................................................................................. 869
Overview of RBAC.......................................................................................................................870
User Roles....................................................................................................................................872
AAA Authentication and Authorization for Roles.......................................................................876
Role Accounting..........................................................................................................................879
Display Information About User Roles.......................................................................................880
49 Service Provider Bridging.............................................................................882
VLAN Stacking...................................................................................................................................882
Important Points to Remember................................................................................................. 883
Configure VLAN Stacking...........................................................................................................884
Creating Access and Trunk Ports...............................................................................................884
Enable VLAN-Stacking for a VLAN............................................................................................. 885
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 885
Configuring Dell Networking OS Options for Trunk Ports....................................................... 885
Debugging VLAN Stacking......................................................................................................... 886
27