Users Guide
TACACS+.......................................................................................................................................................................740
Conguration Task List for TACACS+.......................................................................................................................740
TACACS+ Remote Authentication.............................................................................................................................741
Command Authorization...........................................................................................................................................742
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................................... 743
Enabling SCP and SSH...................................................................................................................................................743
Using SCP with SSH to Copy a Software Image...................................................................................................... 744
Removing the RSA Host Keys and Zeroizing Storage .............................................................................................. 744
Conguring When to Re-generate an SSH Key ....................................................................................................... 744
Conguring the SSH Server Key Exchange Algorithm..............................................................................................745
Conguring the HMAC Algorithm for the SSH Server..............................................................................................745
Conguring the SSH Server Cipher List................................................................................................................... 746
Secure Shell Authentication......................................................................................................................................746
Troubleshooting SSH................................................................................................................................................749
Telnet............................................................................................................................................................................. 749
VTY Line and Access-Class Conguration......................................................................................................................749
VTY Line Local Authentication and Authorization..................................................................................................... 749
VTY Line Remote Authentication and Authorization.................................................................................................750
VTY MAC-SA Filter Support.................................................................................................................................... 750
Role-Based Access Control.............................................................................................................................................751
Overview of RBAC....................................................................................................................................................751
User Roles................................................................................................................................................................753
AAA Authentication and Authorization for Roles...................................................................................................... 757
Role Accounting.......................................................................................................................................................759
Display Information About User Roles.......................................................................................................................760
49 Service Provider Bridging..........................................................................................762
VLAN Stacking...............................................................................................................................................................762
Important Points to Remember................................................................................................................................ 763
Congure VLAN Stacking.........................................................................................................................................763
Creating Access and Trunk Ports............................................................................................................................. 764
Enable VLAN-Stacking for a VLAN.......................................................................................................................... 764
Conguring the Protocol Type Value for the Outer VLAN Tag..................................................................................765
Conguring Dell Networking OS Options for Trunk Ports.........................................................................................765
Debugging VLAN Stacking.......................................................................................................................................766
VLAN Stacking in Multi-Vendor Networks................................................................................................................766
VLAN Stacking Packet Drop Precedence........................................................................................................................771
Enabling Drop Eligibility..............................................................................................................................................771
Honoring the Incoming DEI Value.............................................................................................................................. 771
Marking Egress Packets with a DEI Value.................................................................................................................772
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 773
Mapping C-Tag to S-Tag dot1p Values.......................................................................................................................774
Layer 2 Protocol Tunneling............................................................................................................................................. 775
Implementation Information......................................................................................................................................776
Enabling Layer 2 Protocol Tunneling..........................................................................................................................777
Specifying a Destination MAC Address for BPDUs................................................................................................... 777
25










