Administrator Guide

Table Of Contents
Conguration Task List for TACACS+................................................................................................................... 783
TACACS+ Remote Authentication.........................................................................................................................784
Command Authorization......................................................................................................................................... 785
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 786
Enabling SCP and SSH..................................................................................................................................................786
Using SCP with SSH to Copy a Software Image.................................................................................................787
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................788
Conguring When to Re-generate an SSH Key ..................................................................................................788
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 788
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 789
Conguring the HMAC Algorithm for the SSH Client.........................................................................................789
Conguring the SSH Server Cipher List...............................................................................................................790
Conguring the SSH Client Cipher List................................................................................................................. 791
Secure Shell Authentication.................................................................................................................................... 791
Troubleshooting SSH...............................................................................................................................................794
Telnet...............................................................................................................................................................................794
VTY Line and Access-Class Conguration................................................................................................................. 794
VTY Line Local Authentication and Authorization............................................................................................... 795
VTY Line Remote Authentication and Authorization...........................................................................................795
VTY MAC-SA Filter Support.................................................................................................................................. 796
Role-Based Access Control..........................................................................................................................................796
Overview of RBAC...................................................................................................................................................797
User Roles.................................................................................................................................................................799
AAA Authentication and Authorization for Roles.................................................................................................802
Role Accounting.......................................................................................................................................................805
Display Information About User Roles...................................................................................................................805
Two Factor Authentication (2FA)................................................................................................................................ 807
Handling Access-Challenge Message................................................................................................................... 807
Conguring Challenge Response Authentication for SSHv2............................................................................. 807
SMS-OTP Mechanism............................................................................................................................................808
Conguring the System to Drop Certain ICMP Reply Messages............................................................................808
48 Service Provider Bridging.........................................................................................................................810
VLAN Stacking............................................................................................................................................................... 810
Important Points to Remember...............................................................................................................................811
Congure VLAN Stacking........................................................................................................................................ 811
Creating Access and Trunk Ports........................................................................................................................... 812
Enable VLAN-Stacking for a VLAN........................................................................................................................813
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................813
Conguring Dell Networking OS Options for Trunk Ports...................................................................................813
Debugging VLAN Stacking......................................................................................................................................814
VLAN Stacking in Multi-Vendor Networks............................................................................................................815
VLAN Stacking Packet Drop Precedence................................................................................................................... 819
Enabling Drop Eligibility............................................................................................................................................ 819
Honoring the Incoming DEI Value.......................................................................................................................... 820
Marking Egress Packets with a DEI Value............................................................................................................ 820
Contents
25