Configuration Task List for RADIUS.......................................................................................................................... 746TACACS+....................................................................................................................................................................... 748Configuration Task List for TACACS+....................................................................................................................... 748TACACS+ Remote Authentication............................................................................................................................750Command Authorization........................................................................................................................................... 751Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................................ 751Enabling SCP and SSH....................................................................................................................................................751Using SCP with SSH to Copy a Software Image...................................................................................................... 752Removing the RSA Host Keys and Zeroizing Storage .............................................................................................. 753Configuring When to Re-generate an SSH Key ....................................................................................................... 753Configuring the SSH Server Key Exchange Algorithm..............................................................................................754Configuring the HMAC Algorithm for the SSH Server..............................................................................................754Configuring the SSH Server Cipher List................................................................................................................... 755Secure Shell Authentication..................................................................................................................................... 755Troubleshooting SSH................................................................................................................................................758Telnet............................................................................................................................................................................. 758VTY Line and Access-Class Configuration......................................................................................................................758VTY Line Local Authentication and Authorization.....................................................................................................758VTY Line Remote Authentication and Authorization.................................................................................................759VTY MAC-SA Filter Support.....................................................................................................................................759Role-Based Access Control............................................................................................................................................ 760Overview of RBAC................................................................................................................................................... 760User Roles................................................................................................................................................................762AAA Authentication and Authorization for Roles...................................................................................................... 766Role Accounting....................................................................................................................................................... 768Display Information About User Roles.......................................................................................................................76949 Service Provider Bridging...........................................................................................771VLAN Stacking................................................................................................................................................................771Important Points to Remember................................................................................................................................ 772Configure VLAN Stacking.........................................................................................................................................772Creating Access and Trunk Ports..............................................................................................................................773Enable VLAN-Stacking for a VLAN...........................................................................................................................773Configuring the Protocol Type Value for the Outer VLAN Tag.................................................................................. 774Configuring Dell Networking OS Options for Trunk Ports......................................................................................... 774Debugging VLAN Stacking....................................................................................................................................... 775VLAN Stacking in Multi-Vendor Networks................................................................................................................775VLAN Stacking Packet Drop Precedence.......................................................................................................................780Enabling Drop Eligibility.............................................................................................................................................780Honoring the Incoming DEI Value............................................................................................................................. 780Marking Egress Packets with a DEI Value..................................................................................................................781Dynamic Mode CoS for VLAN Stacking.......................................................................................................................... 781Mapping C-Tag to S-Tag dot1p Values.......................................................................................................................783Layer 2 Protocol Tunneling............................................................................................................................................. 783Implementation Information......................................................................................................................................785Enabling Layer 2 Protocol Tunneling......................................................................................................................... 78525