TACACS+ Remote Authentication.............................................................................................. 731Command Authorization............................................................................................................ 732Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................732Enabling SCP and SSH...................................................................................................................... 732Using SCP with SSH to Copy a Software Image........................................................................ 733Removing the RSA Host Keys and Zeroizing Storage ............................................................... 733Configuring When to Re-generate an SSH Key ........................................................................ 734Configuring the SSH Server Key Exchange Algorithm...............................................................734Configuring the HMAC Algorithm for the SSH Server............................................................... 735Configuring the SSH Server Cipher List......................................................................................735Secure Shell Authentication........................................................................................................736Troubleshooting SSH.................................................................................................................. 739Telnet.................................................................................................................................................739VTY Line and Access-Class Configuration.......................................................................................739VTY Line Local Authentication and Authorization.....................................................................740VTY Line Remote Authentication and Authorization.................................................................740VTY MAC-SA Filter Support......................................................................................................... 741Role-Based Access Control.............................................................................................................. 741Overview of RBAC.......................................................................................................................742User Roles....................................................................................................................................744AAA Authentication and Authorization for Roles.......................................................................748Role Accounting.......................................................................................................................... 751Display Information About User Roles....................................................................................... 75244 Service Provider Bridging.............................................................................754VLAN Stacking................................................................................................................................... 754Important Points to Remember..................................................................................................755Configure VLAN Stacking............................................................................................................756Creating Access and Trunk Ports............................................................................................... 756Enable VLAN-Stacking for a VLAN..............................................................................................757Configuring the Protocol Type Value for the Outer VLAN Tag.................................................757Configuring Dell Networking OS Options for Trunk Ports........................................................ 757Debugging VLAN Stacking..........................................................................................................758VLAN Stacking in Multi-Vendor Networks................................................................................. 759VLAN Stacking Packet Drop Precedence.........................................................................................762Enabling Drop Eligibility.............................................................................................................. 762Honoring the Incoming DEI Value............................................................................................. 763Marking Egress Packets with a DEI Value...................................................................................764Dynamic Mode CoS for VLAN Stacking........................................................................................... 764Mapping C-Tag to S-Tag dot1p Values......................................................................................766Layer 2 Protocol Tunneling.............................................................................................................. 766Implementation Information...................................................................................................... 768