Users Guide

TACACS+ Remote Authentication and Authorization............................................. 998
Command Authorization............................................................................................. 1000
Protection from TCP Tiny and Overlapping Fragment Attacks.................................1000
Enabling SCP and SSH........................................................................................................1000
Using SCP with SSH to Copy a Software Image......................................................1001
Removing the RSA Host Keys and Zeroizing Storage ........................................... 1002
Configuring When to Re-generate an SSH Key ..................................................... 1003
Configuring the SSH Server Cipher List.....................................................................1003
Configuring the HMAC Algorithm for the SSH Server........................................... 1004
Configuring the HMAC Algorithm for the SSH Client............................................1004
Configuring the SSH Server Cipher List.....................................................................1005
Configuring the SSH Client Cipher List.....................................................................1006
Secure Shell Authentication........................................................................................ 1006
Troubleshooting SSH.................................................................................................... 1009
Telnet..................................................................................................................................... 1009
VTY Line and Access-Class Configuration..................................................................... 1010
VTY Line Local Authentication and Authorization...................................................1010
VTY Line Remote Authentication and Authorization...............................................1011
VTY MAC-SA Filter Support.......................................................................................... 1012
50 Service Provider Bridging............................................................................................... 1013
VLAN Stacking.......................................................................................................................1013
Important Points to Remember.................................................................................. 1014
Configure VLAN Stacking..............................................................................................1015
Creating Access and Trunk Ports................................................................................ 1015
Enable VLAN-Stacking for a VLAN..............................................................................1016
Configuring the Protocol Type Value for the Outer VLAN Tag............................1016
Configuring Options for Trunk Ports..........................................................................1017
Debugging VLAN Stacking............................................................................................1018
VLAN Stacking in Multi-Vendor Networks................................................................ 1018
VLAN Stacking Packet Drop Precedence........................................................................1022
Enabling Drop Eligibility................................................................................................1023
Honoring the Incoming DEI Value............................................................................. 1023
Marking Egress Packets with a DEI Value................................................................. 1024
Dynamic Mode CoS for VLAN Stacking.......................................................................... 1025
Mapping C-Tag to S-Tag dot1p Values.....................................................................1026
Layer 2 Protocol Tunneling................................................................................................1027
Implementation Information....................................................................................... 1029
Enabling Layer 2 Protocol Tunneling........................................................................ 1030
Specifying a Destination MAC Address for BPDUs................................................. 1030
Setting Rate-Limit BPDUs............................................................................................ 1030
Debugging Layer 2 Protocol Tunneling.....................................................................1031
Version 9.10(0.0)
29