RADIUS Authentication...............................................................................................................867
Configuration Task List for RADIUS........................................................................................... 868
TACACS+........................................................................................................................................... 871
Configuration Task List for TACACS+.........................................................................................871
TACACS+ Remote Authentication............................................................................................. 873
Command Authorization............................................................................................................874
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 875
Enabling SCP and SSH...................................................................................................................... 875
Using SCP with SSH to Copy a Software Image........................................................................876
Removing the RSA Host Keys and Zeroizing Storage ...............................................................876
Configuring When to Re-generate an SSH Key ........................................................................876
Configuring the SSH Server Key Exchange Algorithm...............................................................877
Configuring the HMAC Algorithm for the SSH Server............................................................... 877
Configuring the SSH Server Cipher List..................................................................................... 878
Secure Shell Authentication....................................................................................................... 879
Troubleshooting SSH.................................................................................................................. 881
Telnet................................................................................................................................................ 882
VTY Line and Access-Class Configuration...................................................................................... 882
VTY Line Local Authentication and Authorization.....................................................................882
VTY Line Remote Authentication and Authorization.................................................................883
VTY MAC-SA Filter Support........................................................................................................ 884
Role-Based Access Control............................................................................................................. 884
Overview of RBAC.......................................................................................................................885
User Roles................................................................................................................................... 888
AAA Authentication and Authorization for Roles.......................................................................891
Role Accounting......................................................................................................................... 894
Display Information About User Roles.......................................................................................896
49 Service Provider Bridging.............................................................................898
VLAN Stacking...................................................................................................................................898
Important Points to Remember................................................................................................. 899
Configure VLAN Stacking...........................................................................................................900
Creating Access and Trunk Ports...............................................................................................900
Enable VLAN-Stacking for a VLAN............................................................................................. 901
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................901
Configuring Dell Networking OS Options for Trunk Ports....................................................... 902
Debugging VLAN Stacking......................................................................................................... 903
VLAN Stacking in Multi-Vendor Networks.................................................................................903
VLAN Stacking Packet Drop Precedence........................................................................................ 907
Enabling Drop Eligibility..............................................................................................................907
Honoring the Incoming DEI Value.............................................................................................908
Marking Egress Packets with a DEI Value.................................................................................. 908
27