Service Manual
Configuring When to Re-generate an SSH Key ........................................................................843
Configuring the SSH Server Key Exchange Algorithm.............................................................. 843
Configuring the HMAC Algorithm for the SSH Server...............................................................844
Configuring the SSH Server Cipher List..................................................................................... 844
Secure Shell Authentication....................................................................................................... 845
Troubleshooting SSH..................................................................................................................847
Telnet................................................................................................................................................ 848
VTY Line and Access-Class Configuration...................................................................................... 848
VTY Line Local Authentication and Authorization.....................................................................848
VTY Line Remote Authentication and Authorization................................................................ 849
VTY MAC-SA Filter Support........................................................................................................ 850
Role-Based Access Control............................................................................................................. 850
Overview of RBAC....................................................................................................................... 851
User Roles....................................................................................................................................853
AAA Authentication and Authorization for Roles.......................................................................857
Role Accounting......................................................................................................................... 860
Display Information About User Roles....................................................................................... 861
49 Service Provider Bridging.............................................................................863
VLAN Stacking...................................................................................................................................863
Important Points to Remember................................................................................................. 864
Configure VLAN Stacking........................................................................................................... 865
Creating Access and Trunk Ports............................................................................................... 865
Enable VLAN-Stacking for a VLAN............................................................................................. 866
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 866
Configuring Dell Networking OS Options for Trunk Ports....................................................... 866
Debugging VLAN Stacking..........................................................................................................867
VLAN Stacking in Multi-Vendor Networks.................................................................................868
VLAN Stacking Packet Drop Precedence.........................................................................................872
Enabling Drop Eligibility.............................................................................................................. 872
Honoring the Incoming DEI Value............................................................................................. 873
Marking Egress Packets with a DEI Value...................................................................................873
Dynamic Mode CoS for VLAN Stacking...........................................................................................874
Mapping C-Tag to S-Tag dot1p Values......................................................................................875
Layer 2 Protocol Tunneling..............................................................................................................876
Implementation Information......................................................................................................878
Enabling Layer 2 Protocol Tunneling.........................................................................................879
Specifying a Destination MAC Address for BPDUs.................................................................... 879
Setting Rate-Limit BPDUs...........................................................................................................879
Debugging Layer 2 Protocol Tunneling.................................................................................... 880
Provider Backbone Bridging............................................................................................................ 880
27