Users Guide

Enabling SCP and SSH.......................................................................................................... 943
Using SCP with SSH to Copy a Software Image........................................................944
Secure Shell Authentication...........................................................................................945
Enabling SSH Authentication by Password.................................................................945
Using RSA Authentication of SSH................................................................................. 946
Configuring Host-Based SSH Authentication............................................................946
Using Client-Based SSH Authentication..................................................................... 948
Configuring the HMAC Algorithm for the SSH Server............................................. 948
Configuring the HMAC Algorithm for the SSH Client.............................................. 949
Configuring the SSH Server Cipher List.......................................................................949
Configuring the SSH Client Cipher List....................................................................... 950
Troubleshooting SSH.......................................................................................................951
Telnet........................................................................................................................................ 951
VTY Line and Access-Class Configuration........................................................................951
VTY Line Local Authentication and Authorization.................................................... 952
VTY Line Remote Authentication and Authorization................................................953
VTY MAC-SA Filter Support............................................................................................953
53 Service Provider Bridging.................................................................................................954
VLAN Stacking.........................................................................................................................954
Important Points to Remember.................................................................................... 955
Configure VLAN Stacking.....................................................................................................956
Related Configuration Tasks..........................................................................................956
Creating Access and Trunk Ports..................................................................................956
Enable VLAN-Stacking for a VLAN................................................................................957
Configuring the Protocol Type Value for the Outer VLAN Tag..............................957
Dell Networking OS Options for Trunk Ports.............................................................958
Debugging VLAN Stacking............................................................................................. 959
VLAN Stacking in Multi-Vendor Networks..................................................................959
VLAN Stacking Packet Drop Precedence......................................................................... 962
Enabling Drop Eligibility..................................................................................................962
Honoring the Incoming DEI Value............................................................................... 963
Marking Egress Packets with a DEI Value................................................................... 964
Dynamic Mode CoS for VLAN Stacking............................................................................ 965
Mapping C-Tag to S-Tag dot1p Values.......................................................................966
Layer 2 Protocol Tunneling..................................................................................................967
Implementation Information......................................................................................... 969
Enabling Layer 2 Protocol Tunneling...........................................................................970
Specifying a Destination MAC Address for BPDUs....................................................970
Setting Rate-Limit BPDUs...............................................................................................970
Debugging Layer 2 Protocol Tunneling.......................................................................971
Provider Backbone Bridging.................................................................................................971
29