Administrator Guide
RADIUS........................................................................................................................................................................... 794
RADIUS Authentication...........................................................................................................................................794
Conguration Task List for RADIUS...................................................................................................................... 795
TACACS+........................................................................................................................................................................799
Conguration Task List for TACACS+................................................................................................................... 799
TACACS+ Remote Authentication........................................................................................................................ 800
Command Authorization.........................................................................................................................................802
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 802
Enabling SCP and SSH................................................................................................................................................. 802
Using SCP with SSH to Copy a Software Image................................................................................................ 803
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 804
Conguring When to Re-generate an SSH Key ..................................................................................................804
Conguring the SSH Server Key Exchange Algorithm.......................................................................................805
Conguring the HMAC Algorithm for the SSH Server.......................................................................................805
Conguring the SSH Server Cipher List...............................................................................................................806
Secure Shell Authentication................................................................................................................................... 806
Troubleshooting SSH...............................................................................................................................................809
Telnet...............................................................................................................................................................................809
VTY Line and Access-Class Conguration................................................................................................................. 809
VTY Line Local Authentication and Authorization................................................................................................810
VTY Line Remote Authentication and Authorization........................................................................................... 810
VTY MAC-SA Filter Support....................................................................................................................................811
Role-Based Access Control............................................................................................................................................811
Overview of RBAC................................................................................................................................................... 812
User Roles................................................................................................................................................................. 814
AAA Authentication and Authorization for Roles..................................................................................................817
Role Accounting.......................................................................................................................................................820
Display Information About User Roles...................................................................................................................820
Two Factor Authentication (2FA)................................................................................................................................ 822
Handling Access-Challenge Message................................................................................................................... 822
Conguring Challenge Response Authentication for SSHv2............................................................................. 822
SMS-OTP Mechanism............................................................................................................................................ 823
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 823
48 Service Provider Bridging........................................................................................................................ 825
VLAN Stacking...............................................................................................................................................................825
Important Points to Remember............................................................................................................................. 826
Congure VLAN Stacking.......................................................................................................................................826
Creating Access and Trunk Ports...........................................................................................................................827
Enable VLAN-Stacking for a VLAN.......................................................................................................................828
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 828
Conguring Dell Networking OS Options for Trunk Ports..................................................................................828
Debugging VLAN Stacking.....................................................................................................................................829
VLAN Stacking in Multi-Vendor Networks...........................................................................................................830
VLAN Stacking Packet Drop Precedence.................................................................................................................. 834
Enabling Drop Eligibility........................................................................................................................................... 834
Contents
25