Administrator Guide
RADIUS........................................................................................................................................................................... 792
RADIUS Authentication...........................................................................................................................................792
Conguration Task List for RADIUS.......................................................................................................................793
TACACS+........................................................................................................................................................................ 797
Conguration Task List for TACACS+....................................................................................................................797
TACACS+ Remote Authentication.........................................................................................................................798
Command Authorization.........................................................................................................................................800
Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................800
Enabling SCP and SSH................................................................................................................................................. 800
Using SCP with SSH to Copy a Software Image................................................................................................. 801
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 802
Conguring When to Re-generate an SSH Key ..................................................................................................802
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 803
Conguring the HMAC Algorithm for the SSH Server.......................................................................................803
Conguring the SSH Server Cipher List...............................................................................................................804
Secure Shell Authentication................................................................................................................................... 804
Troubleshooting SSH...............................................................................................................................................807
Telnet...............................................................................................................................................................................807
VTY Line and Access-Class Conguration................................................................................................................. 807
VTY Line Local Authentication and Authorization............................................................................................... 808
VTY Line Remote Authentication and Authorization.......................................................................................... 808
VTY MAC-SA Filter Support.................................................................................................................................. 809
Role-Based Access Control..........................................................................................................................................809
Overview of RBAC................................................................................................................................................... 810
User Roles................................................................................................................................................................. 812
AAA Authentication and Authorization for Roles................................................................................................. 815
Role Accounting........................................................................................................................................................818
Display Information About User Roles....................................................................................................................818
Two Factor Authentication (2FA)................................................................................................................................ 820
Handling Access-Challenge Message................................................................................................................... 820
Conguring Challenge Response Authentication for SSHv2............................................................................. 820
SMS-OTP Mechanism.............................................................................................................................................821
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................821
48 Service Provider Bridging........................................................................................................................ 823
VLAN Stacking...............................................................................................................................................................823
Important Points to Remember..............................................................................................................................824
Congure VLAN Stacking.......................................................................................................................................824
Creating Access and Trunk Ports.......................................................................................................................... 825
Enable VLAN-Stacking for a VLAN.......................................................................................................................826
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 826
Conguring Dell Networking OS Options for Trunk Ports..................................................................................826
Debugging VLAN Stacking..................................................................................................................................... 827
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 828
VLAN Stacking Packet Drop Precedence.................................................................................................................. 832
Enabling Drop Eligibility........................................................................................................................................... 832
Contents
25