Users Guide

AAA Accounting......................................................................................................................................................743
Configuration Task List for AAA Accounting.............................................................................................. 743
AAA Authentication................................................................................................................................................745
Configuration Task List for AAA Authentication........................................................................................ 746
Obscuring Passwords and Keys.......................................................................................................................... 748
AAA Authorization.................................................................................................................................................. 748
Privilege Levels Overview............................................................................................................................... 749
Configuration Task List for Privilege Levels................................................................................................ 749
RADIUS..................................................................................................................................................................... 754
RADIUS Authentication................................................................................................................................... 754
Configuration Task List for RADIUS.............................................................................................................. 755
TACACS+................................................................................................................................................................. 758
Configuration Task List for TACACS+..........................................................................................................758
TACACS+ Remote Authentication................................................................................................................760
Command Authorization.................................................................................................................................761
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................... 761
Enabling SCP and SSH........................................................................................................................................... 761
Using SCP with SSH to Copy a Software Image........................................................................................ 762
Removing the RSA Host Keys and Zeroizing Storage ..............................................................................763
Configuring When to Re-generate an SSH Key ........................................................................................763
Configuring the SSH Server Key Exchange Algorithm............................................................................. 764
Configuring the HMAC Algorithm for the SSH Server..............................................................................764
Configuring the HMAC Algorithm for the SSH Client...............................................................................765
Configuring the SSH Server Cipher List....................................................................................................... 765
Configuring the SSH Client Cipher List........................................................................................................766
Secure Shell Authentication...........................................................................................................................766
Troubleshooting SSH.......................................................................................................................................769
Telnet........................................................................................................................................................................769
VTY Line and Access-Class Configuration....................................................................................................... 769
VTY Line Local Authentication and Authorization.....................................................................................770
VTY Line Remote Authentication and Authorization................................................................................ 770
VTY MAC-SA Filter Support.............................................................................................................................771
Role-Based Access Control..................................................................................................................................771
Overview of RBAC.............................................................................................................................................771
User Roles.......................................................................................................................................................... 774
AAA Authentication and Authorization for Roles....................................................................................... 777
Role Accounting............................................................................................................................................... 779
Display Information About User Roles......................................................................................................... 781
48 Service Provider Bridging................................................................................................................................783
VLAN Stacking.........................................................................................................................................................783
Important Points to Remember.................................................................................................................... 784
Configure VLAN Stacking............................................................................................................................... 785
Creating Access and Trunk Ports..................................................................................................................785
Enable VLAN-Stacking for a VLAN................................................................................................................786
Configuring the Protocol Type Value for the Outer VLAN Tag..............................................................786
Configuring Dell Networking OS Options for Trunk Ports......................................................................786
9.10(0.0)
24