Administrator Guide

Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................773
Enabling SCP and SSH..................................................................................................................................................773
Using SCP with SSH to Copy a Software Image.................................................................................................774
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................775
Conguring When to Re-generate an SSH Key ..................................................................................................775
Conguring the SSH Server Key Exchange Algorithm........................................................................................776
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 776
Conguring the SSH Server Cipher List............................................................................................................... 777
Secure Shell Authentication....................................................................................................................................777
Troubleshooting SSH...............................................................................................................................................780
Telnet...............................................................................................................................................................................780
VTY Line and Access-Class Conguration................................................................................................................. 780
VTY Line Local Authentication and Authorization................................................................................................ 781
VTY Line Remote Authentication and Authorization............................................................................................781
VTY MAC-SA Filter Support...................................................................................................................................782
Role-Based Access Control.......................................................................................................................................... 782
Overview of RBAC...................................................................................................................................................783
User Roles.................................................................................................................................................................785
AAA Authentication and Authorization for Roles.................................................................................................788
Role Accounting........................................................................................................................................................791
Display Information About User Roles...................................................................................................................792
Two Factor Authentication (2FA)................................................................................................................................ 793
Handling Access-Challenge Message................................................................................................................... 793
Conguring Challenge Response Authentication for SSHv2............................................................................. 793
SMS-OTP Mechanism............................................................................................................................................ 794
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 794
45 Service Provider Bridging........................................................................................................................ 796
VLAN Stacking...............................................................................................................................................................796
Important Points to Remember..............................................................................................................................797
Congure VLAN Stacking....................................................................................................................................... 797
Creating Access and Trunk Ports.......................................................................................................................... 798
Enable VLAN-Stacking for a VLAN.......................................................................................................................799
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 799
Conguring Dell Networking OS Options for Trunk Ports..................................................................................799
Debugging VLAN Stacking.....................................................................................................................................800
VLAN Stacking in Multi-Vendor Networks...........................................................................................................800
VLAN Stacking Packet Drop Precedence.................................................................................................................. 804
Enabling Drop Eligibility........................................................................................................................................... 804
Honoring the Incoming DEI Value..........................................................................................................................805
Marking Egress Packets with a DEI Value............................................................................................................ 806
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................806
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................807
Layer 2 Protocol Tunneling........................................................................................................................................... 808
Implementation Information.................................................................................................................................... 810
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 810
Contents
25