Users Guide
Command Authorization............................................................................................................................................741
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................................ 741
Enabling SCP and SSH...................................................................................................................................................742
Using SCP with SSH to Copy a Software Image...................................................................................................... 742
Removing the RSA Host Keys and Zeroizing Storage .............................................................................................. 743
Conguring When to Re-generate an SSH Key ....................................................................................................... 743
Conguring the SSH Server Key Exchange Algorithm..............................................................................................743
Conguring the HMAC Algorithm for the SSH Server..............................................................................................744
Conguring the SSH Server Cipher List................................................................................................................... 745
Secure Shell Authentication......................................................................................................................................745
Troubleshooting SSH................................................................................................................................................ 747
Telnet............................................................................................................................................................................. 748
VTY Line and Access-Class Conguration......................................................................................................................748
VTY Line Local Authentication and Authorization..................................................................................................... 748
VTY Line Remote Authentication and Authorization.................................................................................................749
VTY MAC-SA Filter Support.....................................................................................................................................749
Role-Based Access Control............................................................................................................................................750
Overview of RBAC...................................................................................................................................................750
User Roles................................................................................................................................................................752
AAA Authentication and Authorization for Roles...................................................................................................... 755
Role Accounting.......................................................................................................................................................758
Display Information About User Roles.......................................................................................................................759
49 Service Provider Bridging.......................................................................................... 761
VLAN Stacking................................................................................................................................................................761
Important Points to Remember................................................................................................................................ 762
Congure VLAN Stacking.........................................................................................................................................762
Creating Access and Trunk Ports............................................................................................................................. 763
Enable VLAN-Stacking for a VLAN.......................................................................................................................... 763
Conguring the Protocol Type Value for the Outer VLAN Tag.................................................................................. 764
Conguring Dell Networking OS Options for Trunk Ports......................................................................................... 764
Debugging VLAN Stacking.......................................................................................................................................765
VLAN Stacking in Multi-Vendor Networks................................................................................................................765
VLAN Stacking Packet Drop Precedence.......................................................................................................................770
Enabling Drop Eligibility.............................................................................................................................................770
Honoring the Incoming DEI Value............................................................................................................................. 770
Marking Egress Packets with a DEI Value..................................................................................................................771
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 772
Mapping C-Tag to S-Tag dot1p Values.......................................................................................................................773
Layer 2 Protocol Tunneling..............................................................................................................................................774
Implementation Information......................................................................................................................................775
Enabling Layer 2 Protocol Tunneling......................................................................................................................... 776
Specifying a Destination MAC Address for BPDUs...................................................................................................776
Setting Rate-Limit BPDUs........................................................................................................................................776
Debugging Layer 2 Protocol Tunneling......................................................................................................................777
Provider Backbone Bridging............................................................................................................................................777
25










