Users Guide
TACACS+ Remote Authentication.........................................................................................................................781
Command Authorization......................................................................................................................................... 782
Protection from TCP Tiny and Overlapping Fragment Attacks.............................................................................. 782
Enabling SCP and SSH..................................................................................................................................................782
Using SCP with SSH to Copy a Software Image................................................................................................ 783
Removing the RSA Host Keys and Zeroizing Storage .......................................................................................784
Configuring When to Re-generate an SSH Key ................................................................................................. 784
Configuring the SSH Server Key Exchange Algorithm.......................................................................................785
Configuring the HMAC Algorithm for the SSH Server.......................................................................................785
Configuring the HMAC Algorithm for the SSH Client........................................................................................ 786
Configuring the SSH Server Cipher List...............................................................................................................786
Configuring the SSH Client Cipher List.................................................................................................................787
Secure Shell Authentication................................................................................................................................... 787
Troubleshooting SSH.............................................................................................................................................. 790
Telnet.............................................................................................................................................................................. 790
VTY Line and Access-Class Configuration................................................................................................................. 790
VTY Line Local Authentication and Authorization................................................................................................791
VTY Line Remote Authentication and Authorization........................................................................................... 791
VTY MAC-SA Filter Support.................................................................................................................................. 792
Role-Based Access Control..........................................................................................................................................792
Overview of RBAC.................................................................................................................................................. 793
User Roles.................................................................................................................................................................795
AAA Authentication and Authorization for Roles.................................................................................................798
Role Accounting....................................................................................................................................................... 801
Display Information About User Roles.................................................................................................................. 802
Two Factor Authentication (2FA)...............................................................................................................................803
Handling Access-Challenge Message................................................................................................................... 803
Configuring Challenge Response Authentication for SSHv2.............................................................................803
SMS-OTP Mechanism............................................................................................................................................804
Configuring the System to Drop Certain ICMP Reply Messages........................................................................... 804
48 Service Provider Bridging........................................................................................................................ 807
VLAN Stacking...............................................................................................................................................................807
Important Points to Remember.............................................................................................................................808
Configure VLAN Stacking...................................................................................................................................... 808
Creating Access and Trunk Ports......................................................................................................................... 809
Enable VLAN-Stacking for a VLAN........................................................................................................................810
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................... 810
Configuring Dell Networking OS Options for Trunk Ports..................................................................................810
Debugging VLAN Stacking.......................................................................................................................................811
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 812
VLAN Stacking Packet Drop Precedence...................................................................................................................816
Enabling Drop Eligibility............................................................................................................................................816
Honoring the Incoming DEI Value...........................................................................................................................817
Marking Egress Packets with a DEI Value.............................................................................................................817
Dynamic Mode CoS for VLAN Stacking......................................................................................................................818
Contents
25










