Reference Guide

Table Of Contents
Obscuring Passwords and Keys....................................................................................................... 829
AAA Authorization.............................................................................................................................830
Privilege Levels Overview........................................................................................................... 830
Configuration Task List for Privilege Levels...............................................................................830
RADIUS..............................................................................................................................................834
RADIUS Authentication and Authorization................................................................................ 835
Configuration Task List for RADIUS........................................................................................... 836
TACACS+.......................................................................................................................................... 839
Configuration Task List for TACACS+........................................................................................839
Command Authorization............................................................................................................ 841
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................842
Enabling SCP and SSH......................................................................................................................842
Using SCP with SSH to Copy a Software Image........................................................................843
Secure Shell Authentication....................................................................................................... 844
Enabling SSH Authentication by Password................................................................................844
Using RSA Authentication of SSH...............................................................................................845
Configuring Host-Based SSH Authentication............................................................................845
Using Client-Based SSH Authentication....................................................................................846
Troubleshooting SSH..................................................................................................................847
Telnet.................................................................................................................................................847
VTY Line and Access-Class Configuration...................................................................................... 847
VTY Line Local Authentication and Authorization.....................................................................848
VTY Line Remote Authentication and Authorization................................................................ 848
VTY MAC-SA Filter Support........................................................................................................ 849
53 Service Provider Bridging.............................................................................850
VLAN Stacking...................................................................................................................................850
Important Points to Remember..................................................................................................851
Configure VLAN Stacking................................................................................................................. 852
Related Configuration Tasks.......................................................................................................852
Creating Access and Trunk Ports............................................................................................... 852
Enable VLAN-Stacking for a VLAN............................................................................................. 853
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 853
Dell Networking OS Options for Trunk Ports............................................................................ 853
Debugging VLAN Stacking..........................................................................................................854
VLAN Stacking in Multi-Vendor Networks.................................................................................855
VLAN Stacking Packet Drop Precedence........................................................................................ 859
Enabling Drop Eligibility..............................................................................................................859
Honoring the Incoming DEI Value.............................................................................................860
Marking Egress Packets with a DEI Value.................................................................................. 860
Dynamic Mode CoS for VLAN Stacking........................................................................................... 861
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 862