Users Guide
TACACS+....................................................................................................................................................................... 794
Configuration Task List for TACACS+..................................................................................................................794
TACACS+ Remote Authentication........................................................................................................................796
Command Authorization......................................................................................................................................... 797
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................797
Enabling SCP and SSH..................................................................................................................................................797
Using SCP with SSH to Copy a Software Image................................................................................................ 798
Removing the RSA Host Keys and Zeroizing Storage .......................................................................................799
Configuring When to Re-generate an SSH Key ................................................................................................. 799
Configuring the SSH Server Key Exchange Algorithm.......................................................................................800
Configuring the HMAC Algorithm for the SSH Server.......................................................................................800
Configuring the SSH Server Cipher List............................................................................................................... 801
Secure Shell Authentication....................................................................................................................................801
Troubleshooting SSH.............................................................................................................................................. 804
Telnet.............................................................................................................................................................................. 804
VTY Line and Access-Class Configuration.................................................................................................................805
VTY Line Local Authentication and Authorization...............................................................................................805
VTY Line Remote Authentication and Authorization.......................................................................................... 806
VTY MAC-SA Filter Support..................................................................................................................................806
Role-Based Access Control..........................................................................................................................................806
Overview of RBAC.................................................................................................................................................. 807
User Roles................................................................................................................................................................ 809
AAA Authentication and Authorization for Roles................................................................................................. 813
Role Accounting....................................................................................................................................................... 815
Display Information About User Roles................................................................................................................... 816
Two Factor Authentication (2FA)................................................................................................................................817
Handling Access-Challenge Message....................................................................................................................818
Configuring Challenge Response Authentication for SSHv2..............................................................................818
SMS-OTP Mechanism.............................................................................................................................................818
Configuring the System to Drop Certain ICMP Reply Messages............................................................................ 819
48 Service Provider Bridging.........................................................................................................................821
VLAN Stacking................................................................................................................................................................821
Important Points to Remember............................................................................................................................. 822
Configure VLAN Stacking.......................................................................................................................................822
Creating Access and Trunk Ports..........................................................................................................................823
Enable VLAN-Stacking for a VLAN.......................................................................................................................824
Configuring the Protocol Type Value for the Outer VLAN Tag.........................................................................824
Configuring Dell Networking OS Options for Trunk Ports................................................................................. 824
Debugging VLAN Stacking.....................................................................................................................................825
VLAN Stacking in Multi-Vendor Networks.......................................................................................................... 826
VLAN Stacking Packet Drop Precedence..................................................................................................................830
Enabling Drop Eligibility...........................................................................................................................................830
Honoring the Incoming DEI Value...........................................................................................................................831
Marking Egress Packets with a DEI Value............................................................................................................ 831
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................832
Contents
25