Dell 9.7(0.0) Plumbing Product User Manual


  Open as PDF
of 1039
 
RADIUS Authentication and Authorization................................................................................800
Configuration Task List for RADIUS............................................................................................801
TACACS+..........................................................................................................................................804
Configuration Task List for TACACS+........................................................................................804
TACACS+ Remote Authentication and Authorization.............................................................. 806
Command Authorization............................................................................................................807
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................808
Enabling SCP and SSH......................................................................................................................808
Using SCP with SSH to Copy a Software Image........................................................................809
Removing the RSA Host Keys and Zeroizing Storage ...............................................................810
Configuring When to Re-generate an SSH Key ........................................................................810
Configuring the SSH Server Cipher List......................................................................................810
Configuring the HMAC Algorithm for the SSH Server................................................................811
Configuring the SSH Server Cipher List......................................................................................812
Secure Shell Authentication........................................................................................................812
Troubleshooting SSH.................................................................................................................. 815
Telnet.................................................................................................................................................815
VTY Line and Access-Class Configuration.......................................................................................816
VTY Line Local Authentication and Authorization.....................................................................816
VTY Line Remote Authentication and Authorization................................................................. 817
VTY MAC-SA Filter Support.........................................................................................................817
48 Service Provider Bridging.............................................................................819
VLAN Stacking...................................................................................................................................819
Important Points to Remember.................................................................................................820
Configure VLAN Stacking............................................................................................................821
Creating Access and Trunk Ports................................................................................................821
Enable VLAN-Stacking for a VLAN............................................................................................. 822
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 822
Configuring Options for Trunk Ports......................................................................................... 822
Debugging VLAN Stacking..........................................................................................................823
VLAN Stacking in Multi-Vendor Networks.................................................................................824
VLAN Stacking Packet Drop Precedence.........................................................................................827
Enabling Drop Eligibility..............................................................................................................827
Honoring the Incoming DEI Value.............................................................................................828
Marking Egress Packets with a DEI Value.................................................................................. 829
Dynamic Mode CoS for VLAN Stacking...........................................................................................829
Mapping C-Tag to S-Tag dot1p Values......................................................................................831
Layer 2 Protocol Tunneling.............................................................................................................. 831
Implementation Information......................................................................................................833
Enabling Layer 2 Protocol Tunneling.........................................................................................833
Specifying a Destination MAC Address for BPDUs....................................................................834