Users Guide

Modifying Interface Parameters................................................................................................................................ 751
Conguring an EdgePort..........................................................................................................................................752
Inuencing RSTP Root Selection..............................................................................................................................753
Enabling SNMP Traps for Root Elections and Topology Changes............................................................................. 753
51 Software-Dened Networking (SDN)........................................................................ 754
52 Security.................................................................................................................... 755
AAA Accounting.............................................................................................................................................................755
Conguration Task List for AAA Accounting.............................................................................................................755
AAA Authentication........................................................................................................................................................757
Conguration Task List for AAA Authentication........................................................................................................757
Obscuring Passwords and Keys......................................................................................................................................759
AAA Authorization..........................................................................................................................................................760
Privilege Levels Overview.........................................................................................................................................760
Conguration Task List for Privilege Levels............................................................................................................... 761
RADIUS..........................................................................................................................................................................764
RADIUS Authentication and Authorization............................................................................................................... 765
Conguration Task List for RADIUS..........................................................................................................................766
TACACS+.......................................................................................................................................................................768
Conguration Task List for TACACS+.......................................................................................................................768
Command Authorization...........................................................................................................................................770
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................................771
Enabling SCP and SSH....................................................................................................................................................771
Using SCP with SSH to Copy a Software Image...................................................................................................... 772
Secure Shell Authentication......................................................................................................................................773
Enabling SSH Authentication by Password...............................................................................................................773
Using RSA Authentication of SSH............................................................................................................................ 773
Conguring Host-Based SSH Authentication............................................................................................................774
Using Client-Based SSH Authentication................................................................................................................... 775
Troubleshooting SSH................................................................................................................................................ 775
Telnet............................................................................................................................................................................. 775
VTY Line and Access-Class Conguration...................................................................................................................... 776
VTY Line Local Authentication and Authorization..................................................................................................... 776
VTY Line Remote Authentication and Authorization................................................................................................. 777
VTY MAC-SA Filter Support..................................................................................................................................... 777
53 Service Provider Bridging.......................................................................................... 778
VLAN Stacking............................................................................................................................................................... 778
Important Points to Remember................................................................................................................................ 779
Congure VLAN Stacking...............................................................................................................................................779
Related Conguration Tasks..................................................................................................................................... 780
Creating Access and Trunk Ports............................................................................................................................. 780
Enable VLAN-Stacking for a VLAN.......................................................................................................................... 780
Conguring the Protocol Type Value for the Outer VLAN Tag...................................................................................781
Dell Networking OS Options for Trunk Ports.............................................................................................................781
26