Users Guide

Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................772
Enabling SCP and SSH..................................................................................................................................................772
Using SCP with SSH to Copy a Software Image.................................................................................................773
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................774
Conguring When to Re-generate an SSH Key .................................................................................................. 774
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 775
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 775
Conguring the SSH Server Cipher List............................................................................................................... 776
Secure Shell Authentication....................................................................................................................................776
Troubleshooting SSH............................................................................................................................................... 779
Telnet............................................................................................................................................................................... 779
VTY Line and Access-Class Conguration..................................................................................................................779
VTY Line Local Authentication and Authorization............................................................................................... 780
VTY Line Remote Authentication and Authorization...........................................................................................780
VTY MAC-SA Filter Support................................................................................................................................... 781
Role-Based Access Control...........................................................................................................................................781
Overview of RBAC...................................................................................................................................................782
User Roles.................................................................................................................................................................784
AAA Authentication and Authorization for Roles................................................................................................. 787
Role Accounting.......................................................................................................................................................790
Display Information About User Roles....................................................................................................................791
Two Factor Authentication (2FA)................................................................................................................................ 792
Handling Access-Challenge Message................................................................................................................... 792
Conguring Challenge Response Authentication for SSHv2............................................................................. 792
SMS-OTP Mechanism............................................................................................................................................ 793
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 793
45 Service Provider Bridging........................................................................................................................ 795
VLAN Stacking...............................................................................................................................................................795
Important Points to Remember..............................................................................................................................796
Congure VLAN Stacking.......................................................................................................................................796
Creating Access and Trunk Ports...........................................................................................................................797
Enable VLAN-Stacking for a VLAN....................................................................................................................... 798
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 798
Conguring Dell Networking OS Options for Trunk Ports..................................................................................798
Debugging VLAN Stacking..................................................................................................................................... 799
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 799
VLAN Stacking Packet Drop Precedence.................................................................................................................. 803
Enabling Drop Eligibility........................................................................................................................................... 803
Honoring the Incoming DEI Value..........................................................................................................................804
Marking Egress Packets with a DEI Value............................................................................................................805
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................805
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................. 806
Layer 2 Protocol Tunneling............................................................................................................................................807
Implementation Information................................................................................................................................... 809
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 809
Contents
25