EasyManua.ls Logo

Dell S4820T - Page 27

Dell S4820T
1178 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
RADIUS Authentication...............................................................................................................867
Configuration Task List for RADIUS........................................................................................... 868
TACACS+........................................................................................................................................... 871
Configuration Task List for TACACS+.........................................................................................871
TACACS+ Remote Authentication............................................................................................. 873
Command Authorization............................................................................................................874
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 875
Enabling SCP and SSH...................................................................................................................... 875
Using SCP with SSH to Copy a Software Image........................................................................876
Removing the RSA Host Keys and Zeroizing Storage ...............................................................876
Configuring When to Re-generate an SSH Key ........................................................................876
Configuring the SSH Server Key Exchange Algorithm...............................................................877
Configuring the HMAC Algorithm for the SSH Server............................................................... 877
Configuring the SSH Server Cipher List..................................................................................... 878
Secure Shell Authentication....................................................................................................... 879
Troubleshooting SSH.................................................................................................................. 881
Telnet................................................................................................................................................ 882
VTY Line and Access-Class Configuration...................................................................................... 882
VTY Line Local Authentication and Authorization.....................................................................882
VTY Line Remote Authentication and Authorization.................................................................883
VTY MAC-SA Filter Support........................................................................................................ 884
Role-Based Access Control............................................................................................................. 884
Overview of RBAC.......................................................................................................................885
User Roles................................................................................................................................... 888
AAA Authentication and Authorization for Roles.......................................................................891
Role Accounting......................................................................................................................... 894
Display Information About User Roles.......................................................................................896
49 Service Provider Bridging.............................................................................898
VLAN Stacking...................................................................................................................................898
Important Points to Remember................................................................................................. 899
Configure VLAN Stacking...........................................................................................................900
Creating Access and Trunk Ports...............................................................................................900
Enable VLAN-Stacking for a VLAN............................................................................................. 901
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................901
Configuring Dell Networking OS Options for Trunk Ports....................................................... 902
Debugging VLAN Stacking......................................................................................................... 903
VLAN Stacking in Multi-Vendor Networks.................................................................................903
VLAN Stacking Packet Drop Precedence........................................................................................ 907
Enabling Drop Eligibility..............................................................................................................907
Honoring the Incoming DEI Value.............................................................................................908
Marking Egress Packets with a DEI Value.................................................................................. 908
27

Table of Contents

Other manuals for Dell S4820T

Related product manuals