Users Guide
TACACS+.......................................................................................................................................................................739
Conguration Task List for TACACS+.......................................................................................................................739
TACACS+ Remote Authentication.............................................................................................................................741
Command Authorization...........................................................................................................................................742
Protection from TCP Tiny and Overlapping Fragment Attacks....................................................................................... 742
Enabling SCP and SSH...................................................................................................................................................742
Using SCP with SSH to Copy a Software Image...................................................................................................... 743
Removing the RSA Host Keys and Zeroizing Storage .............................................................................................. 744
Conguring When to Re-generate an SSH Key ....................................................................................................... 744
Conguring the SSH Server Key Exchange Algorithm..............................................................................................744
Conguring the HMAC Algorithm for the SSH Server..............................................................................................745
Conguring the SSH Server Cipher List................................................................................................................... 745
Secure Shell Authentication......................................................................................................................................746
Troubleshooting SSH................................................................................................................................................ 748
Telnet............................................................................................................................................................................. 749
VTY Line and Access-Class Conguration......................................................................................................................749
VTY Line Local Authentication and Authorization..................................................................................................... 749
VTY Line Remote Authentication and Authorization.................................................................................................750
VTY MAC-SA Filter Support.................................................................................................................................... 750
Role-Based Access Control.............................................................................................................................................751
Overview of RBAC....................................................................................................................................................751
User Roles................................................................................................................................................................753
AAA Authentication and Authorization for Roles...................................................................................................... 756
Role Accounting.......................................................................................................................................................759
Display Information About User Roles.......................................................................................................................760
49 Service Provider Bridging..........................................................................................762
VLAN Stacking...............................................................................................................................................................762
Important Points to Remember................................................................................................................................ 763
Congure VLAN Stacking.........................................................................................................................................763
Creating Access and Trunk Ports............................................................................................................................. 764
Enable VLAN-Stacking for a VLAN.......................................................................................................................... 764
Conguring the Protocol Type Value for the Outer VLAN Tag.................................................................................. 765
Conguring Dell Networking OS Options for Trunk Ports.........................................................................................765
Debugging VLAN Stacking.......................................................................................................................................766
VLAN Stacking in Multi-Vendor Networks................................................................................................................766
VLAN Stacking Packet Drop Precedence........................................................................................................................771
Enabling Drop Eligibility..............................................................................................................................................771
Honoring the Incoming DEI Value.............................................................................................................................. 771
Marking Egress Packets with a DEI Value.................................................................................................................772
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 772
Mapping C-Tag to S-Tag dot1p Values.......................................................................................................................774
Layer 2 Protocol Tunneling..............................................................................................................................................774
Implementation Information......................................................................................................................................776
Enabling Layer 2 Protocol Tunneling......................................................................................................................... 776
Specifying a Destination MAC Address for BPDUs................................................................................................... 777
25










