Administrator Guide

Configuration Task List for AAA Accounting.............................................................. 785
AAA Authentication................................................................................................................788
Configuration Task List for AAA Authentication........................................................ 788
AAA Authorization...................................................................................................................791
Privilege Levels Overview................................................................................................791
Configuration Task List for Privilege Levels.................................................................791
RADIUS..................................................................................................................................... 796
RADIUS Authentication and Authorization................................................................. 796
Configuration Task List for RADIUS..............................................................................798
TACACS+................................................................................................................................. 801
Configuration Task List for TACACS+..........................................................................801
TACACS+ Remote Authentication............................................................................... 802
Enabling SCP and SSH.......................................................................................................... 804
Using SCP with SSH to Copy a Software Image........................................................805
Secure Shell Authentication.......................................................................................... 806
Configuring the HMAC Algorithm for the SSH Client..............................................806
Configuring the SSH Client Cipher List....................................................................... 807
Telnet........................................................................................................................................807
VTY Line and Access-Class Configuration.......................................................................808
VTY Line Local Authentication and Authorization....................................................808
VTY Line Remote Authentication and Authorization............................................... 809
50 Service Provider Bridging.................................................................................................810
VLAN Stacking.........................................................................................................................810
Important Points to Remember.....................................................................................811
Configure VLAN Stacking................................................................................................812
Creating Access and Trunk Ports..................................................................................812
Enable VLAN-Stacking for a VLAN................................................................................813
Configuring the Protocol Type Value for the Outer VLAN Tag..............................813
Configuring Options for Trunk Ports........................................................................... 814
Debugging VLAN Stacking..............................................................................................815
VLAN Stacking in Multi-Vendor Networks.................................................................. 815
VLAN Stacking Packet Drop Precedence......................................................................... 820
Enabling Drop Eligibility..................................................................................................820
Honoring the Incoming DEI Value................................................................................821
Marking Egress Packets with a DEI Value....................................................................822
Dynamic Mode CoS for VLAN Stacking............................................................................ 822
Mapping C-Tag to S-Tag dot1p Values.......................................................................824
Layer 2 Protocol Tunneling................................................................................................. 824
Implementation Information......................................................................................... 827
Enabling Layer 2 Protocol Tunneling...........................................................................827
Specifying a Destination MAC Address for BPDUs....................................................827
Configuration Guide
25