Users Guide
Obscuring Passwords and Keys...................................................................................................................................730
AAA Authorization......................................................................................................................................................... 730
Privilege Levels Overview....................................................................................................................................... 730
Conguration Task List for Privilege Levels...........................................................................................................731
RADIUS........................................................................................................................................................................... 736
RADIUS Authentication...........................................................................................................................................736
Conguration Task List for RADIUS.......................................................................................................................737
TACACS+........................................................................................................................................................................ 740
Conguration Task List for TACACS+................................................................................................................... 740
TACACS+ Remote Authentication..........................................................................................................................741
Command Authorization......................................................................................................................................... 742
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................743
Enabling SCP and SSH..................................................................................................................................................743
Using SCP with SSH to Copy a Software Image.................................................................................................744
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................745
Conguring When to Re-generate an SSH Key ..................................................................................................745
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 745
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 746
Conguring the HMAC Algorithm for the SSH Client.........................................................................................746
Conguring the SSH Server Cipher List............................................................................................................... 747
Conguring the SSH Client Cipher List................................................................................................................. 747
Secure Shell Authentication....................................................................................................................................748
Troubleshooting SSH...............................................................................................................................................750
Telnet................................................................................................................................................................................751
VTY Line and Access-Class Conguration.................................................................................................................. 751
VTY Line Local Authentication and Authorization................................................................................................ 751
VTY Line Remote Authentication and Authorization...........................................................................................752
VTY MAC-SA Filter Support.................................................................................................................................. 752
Role-Based Access Control..........................................................................................................................................753
Overview of RBAC...................................................................................................................................................753
User Roles.................................................................................................................................................................755
AAA Authentication and Authorization for Roles.................................................................................................758
Role Accounting........................................................................................................................................................761
Display Information About User Roles................................................................................................................... 762
48 Service Provider Bridging........................................................................................................................ 764
VLAN Stacking...............................................................................................................................................................764
Important Points to Remember..............................................................................................................................765
Congure VLAN Stacking.......................................................................................................................................765
Creating Access and Trunk Ports.......................................................................................................................... 766
Enable VLAN-Stacking for a VLAN....................................................................................................................... 766
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................767
Conguring Dell Networking OS Options for Trunk Ports.................................................................................. 767
Debugging VLAN Stacking..................................................................................................................................... 768
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 768
VLAN Stacking Packet Drop Precedence...................................................................................................................773
Enabling Drop Eligibility............................................................................................................................................773
24
Contents










