Users Guide

TACACS+.......................................................................................................................................................................736
Conguration Task List for TACACS+.......................................................................................................................736
TACACS+ Remote Authentication............................................................................................................................738
Command Authorization...........................................................................................................................................739
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................................... 739
Enabling SCP and SSH...................................................................................................................................................739
Using SCP with SSH to Copy a Software Image...................................................................................................... 740
Removing the RSA Host Keys and Zeroizing Storage ...............................................................................................741
Conguring When to Re-generate an SSH Key ........................................................................................................ 741
Conguring the SSH Server Key Exchange Algorithm..............................................................................................742
Conguring the HMAC Algorithm for the SSH Server..............................................................................................742
Conguring the SSH Server Cipher List................................................................................................................... 743
Secure Shell Authentication......................................................................................................................................743
Troubleshooting SSH................................................................................................................................................746
Telnet............................................................................................................................................................................. 746
VTY Line and Access-Class Conguration......................................................................................................................746
VTY Line Local Authentication and Authorization..................................................................................................... 746
VTY Line Remote Authentication and Authorization................................................................................................. 747
VTY MAC-SA Filter Support.....................................................................................................................................747
Role-Based Access Control............................................................................................................................................ 748
Overview of RBAC................................................................................................................................................... 748
User Roles................................................................................................................................................................750
AAA Authentication and Authorization for Roles...................................................................................................... 754
Role Accounting.......................................................................................................................................................756
Display Information About User Roles.......................................................................................................................757
49 Service Provider Bridging..........................................................................................759
VLAN Stacking...............................................................................................................................................................759
Important Points to Remember................................................................................................................................ 760
Congure VLAN Stacking........................................................................................................................................ 760
Creating Access and Trunk Ports.............................................................................................................................. 761
Enable VLAN-Stacking for a VLAN........................................................................................................................... 761
Conguring the Protocol Type Value for the Outer VLAN Tag.................................................................................. 762
Conguring Dell Networking OS Options for Trunk Ports......................................................................................... 762
Debugging VLAN Stacking....................................................................................................................................... 763
VLAN Stacking in Multi-Vendor Networks................................................................................................................763
VLAN Stacking Packet Drop Precedence.......................................................................................................................768
Enabling Drop Eligibility.............................................................................................................................................768
Honoring the Incoming DEI Value............................................................................................................................. 768
Marking Egress Packets with a DEI Value.................................................................................................................769
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 769
Mapping C-Tag to S-Tag dot1p Values....................................................................................................................... 771
Layer 2 Protocol Tunneling.............................................................................................................................................. 771
Implementation Information......................................................................................................................................773
Enabling Layer 2 Protocol Tunneling......................................................................................................................... 773
Specifying a Destination MAC Address for BPDUs................................................................................................... 774
25