Service Manual

Configuring the SSH Server Cipher List....................................................................................................... 787
Configuring the SSH Client Cipher List....................................................................................................... 788
Secure Shell Authentication...........................................................................................................................788
Troubleshooting SSH....................................................................................................................................... 791
Telnet.........................................................................................................................................................................791
VTY Line and Access-Class Configuration........................................................................................................792
VTY Line Local Authentication and Authorization.....................................................................................792
VTY Line Remote Authentication and Authorization................................................................................ 793
VTY MAC-SA Filter Support............................................................................................................................ 793
Role-Based Access Control................................................................................................................................. 793
Overview of RBAC............................................................................................................................................794
User Roles.......................................................................................................................................................... 796
AAA Authentication and Authorization for Roles.......................................................................................799
Role Accounting...............................................................................................................................................802
Display Information About User Roles........................................................................................................ 803
49 Service Provider Bridging............................................................................................................................... 805
VLAN Stacking........................................................................................................................................................ 805
Important Points to Remember....................................................................................................................806
Configure VLAN Stacking............................................................................................................................... 807
Creating Access and Trunk Ports..................................................................................................................807
Enable VLAN-Stacking for a VLAN............................................................................................................... 808
Configuring the Protocol Type Value for the Outer VLAN Tag............................................................. 808
Configuring Dell Networking OS Options for Trunk Ports..................................................................... 808
Debugging VLAN Stacking.............................................................................................................................809
VLAN Stacking in Multi-Vendor Networks.................................................................................................. 810
VLAN Stacking Packet Drop Precedence..........................................................................................................814
Enabling Drop Eligibility.................................................................................................................................. 814
Honoring the Incoming DEI Value................................................................................................................815
Marking Egress Packets with a DEI Value....................................................................................................815
Dynamic Mode CoS for VLAN Stacking.............................................................................................................816
Mapping C-Tag to S-Tag dot1p Values........................................................................................................817
Layer 2 Protocol Tunneling..................................................................................................................................818
Implementation Information......................................................................................................................... 820
Enabling Layer 2 Protocol Tunneling.......................................................................................................... 820
Specifying a Destination MAC Address for BPDUs....................................................................................821
Setting Rate-Limit BPDUs............................................................................................................................... 821
Debugging Layer 2 Protocol Tunneling...................................................................................................... 822
Provider Backbone Bridging................................................................................................................................ 822
50 sFlow................................................................................................................................................................... 823
Overview.................................................................................................................................................................. 823
Implementation Information............................................................................................................................... 823
Important Points to Remember.................................................................................................................... 824
Enabling Extended sFlow..................................................................................................................................... 824
Enabling and Disabling sFlow on an Interface.................................................................................................825
Enabling sFlow Max-Header Size Extended.....................................................................................................825
Contents
25