Users Guide

AAA Authorization..........................................................................................................................................................746
Privilege Levels Overview.........................................................................................................................................746
Conguration Task List for Privilege Levels............................................................................................................... 747
RADIUS..........................................................................................................................................................................750
RADIUS Authentication and Authorization................................................................................................................ 751
Conguration Task List for RADIUS..........................................................................................................................752
TACACS+.......................................................................................................................................................................754
Conguration Task List for TACACS+.......................................................................................................................754
Command Authorization...........................................................................................................................................756
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................................... 757
Enabling SCP and SSH...................................................................................................................................................757
Using SCP with SSH to Copy a Software Image...................................................................................................... 758
Secure Shell Authentication..................................................................................................................................... 759
Enabling SSH Authentication by Password...............................................................................................................759
Using RSA Authentication of SSH............................................................................................................................759
Conguring Host-Based SSH Authentication........................................................................................................... 760
Using Client-Based SSH Authentication....................................................................................................................761
Troubleshooting SSH.................................................................................................................................................761
Telnet.............................................................................................................................................................................. 761
VTY Line and Access-Class Conguration......................................................................................................................762
VTY Line Local Authentication and Authorization.....................................................................................................762
VTY Line Remote Authentication and Authorization.................................................................................................763
VTY MAC-SA Filter Support.....................................................................................................................................763
53 Service Provider Bridging..........................................................................................764
VLAN Stacking...............................................................................................................................................................764
Important Points to Remember................................................................................................................................ 765
Congure VLAN Stacking.............................................................................................................................................. 765
Related Conguration Tasks..................................................................................................................................... 766
Creating Access and Trunk Ports............................................................................................................................. 766
Enable VLAN-Stacking for a VLAN.......................................................................................................................... 766
Conguring the Protocol Type Value for the Outer VLAN Tag.................................................................................. 767
Dell Networking OS Options for Trunk Ports............................................................................................................ 767
Debugging VLAN Stacking....................................................................................................................................... 768
VLAN Stacking in Multi-Vendor Networks................................................................................................................768
VLAN Stacking Packet Drop Precedence....................................................................................................................... 773
Enabling Drop Eligibility.............................................................................................................................................773
Honoring the Incoming DEI Value............................................................................................................................. 773
Marking Egress Packets with a DEI Value................................................................................................................. 774
Dynamic Mode CoS for VLAN Stacking..........................................................................................................................774
Mapping C-Tag to S-Tag dot1p Values.......................................................................................................................776
Layer 2 Protocol Tunneling..............................................................................................................................................776
Implementation Information......................................................................................................................................778
Enabling Layer 2 Protocol Tunneling......................................................................................................................... 778
Specifying a Destination MAC Address for BPDUs...................................................................................................779
Setting Rate-Limit BPDUs........................................................................................................................................779
26