Users Guide

RADIUS........................................................................................................................................................................... 788
RADIUS Authentication...........................................................................................................................................788
Conguration Task List for RADIUS.......................................................................................................................789
TACACS+........................................................................................................................................................................793
Conguration Task List for TACACS+................................................................................................................... 793
TACACS+ Remote Authentication.........................................................................................................................794
Command Authorization.........................................................................................................................................795
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 796
Enabling SCP and SSH................................................................................................................................................. 796
Using SCP with SSH to Copy a Software Image.................................................................................................797
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................798
Conguring When to Re-generate an SSH Key ..................................................................................................798
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 798
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 799
Conguring the SSH Server Cipher List...............................................................................................................800
Secure Shell Authentication...................................................................................................................................800
Troubleshooting SSH...............................................................................................................................................803
Telnet...............................................................................................................................................................................803
VTY Line and Access-Class Conguration................................................................................................................. 803
VTY Line Local Authentication and Authorization............................................................................................... 804
VTY Line Remote Authentication and Authorization.......................................................................................... 804
VTY MAC-SA Filter Support.................................................................................................................................. 805
Role-Based Access Control..........................................................................................................................................805
Overview of RBAC.................................................................................................................................................. 806
User Roles................................................................................................................................................................ 808
AAA Authentication and Authorization for Roles.................................................................................................. 811
Role Accounting........................................................................................................................................................814
Display Information About User Roles....................................................................................................................814
Two Factor Authentication (2FA).................................................................................................................................816
Handling Access-Challenge Message....................................................................................................................816
Conguring Challenge Response Authentication for SSHv2..............................................................................816
SMS-OTP Mechanism.............................................................................................................................................817
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................817
48 Service Provider Bridging.........................................................................................................................819
VLAN Stacking................................................................................................................................................................819
Important Points to Remember............................................................................................................................. 820
Congure VLAN Stacking.......................................................................................................................................820
Creating Access and Trunk Ports........................................................................................................................... 821
Enable VLAN-Stacking for a VLAN.......................................................................................................................822
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 822
Conguring Dell Networking OS Options for Trunk Ports..................................................................................822
Debugging VLAN Stacking..................................................................................................................................... 823
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 824
VLAN Stacking Packet Drop Precedence.................................................................................................................. 828
Enabling Drop Eligibility........................................................................................................................................... 828
Contents
25