Reference Guide
Configuring Host-Based SSH Authentication............................................................................822
Using Client-Based SSH Authentication.................................................................................... 823
Troubleshooting SSH..................................................................................................................824
Telnet................................................................................................................................................ 824
VTY Line and Access-Class Configuration...................................................................................... 824
VTY Line Local Authentication and Authorization.....................................................................825
VTY Line Remote Authentication and Authorization.................................................................825
VTY MAC-SA Filter Support........................................................................................................ 826
52 Service Provider Bridging............................................................................. 827
VLAN Stacking...................................................................................................................................827
Important Points to Remember................................................................................................. 828
Configure VLAN Stacking.................................................................................................................829
Related Configuration Tasks...................................................................................................... 829
Creating Access and Trunk Ports...............................................................................................829
Enable VLAN-Stacking for a VLAN............................................................................................. 830
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 830
Dell Networking OS Options for Trunk Ports............................................................................830
Debugging VLAN Stacking..........................................................................................................831
VLAN Stacking in Multi-Vendor Networks.................................................................................832
VLAN Stacking Packet Drop Precedence........................................................................................ 836
Enabling Drop Eligibility..............................................................................................................836
Honoring the Incoming DEI Value............................................................................................. 837
Marking Egress Packets with a DEI Value...................................................................................837
Dynamic Mode CoS for VLAN Stacking...........................................................................................838
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 839
Layer 2 Protocol Tunneling..............................................................................................................840
Implementation Information......................................................................................................842
Enabling Layer 2 Protocol Tunneling.........................................................................................842
Specifying a Destination MAC Address for BPDUs....................................................................843
Setting Rate-Limit BPDUs...........................................................................................................843
Debugging Layer 2 Protocol Tunneling.....................................................................................844
Provider Backbone Bridging.............................................................................................................844
53 sFlow.................................................................................................................845
Overview........................................................................................................................................... 845
Implementation Information............................................................................................................846
Important Points to Remember................................................................................................. 846
Enabling and Disabling sFlow...........................................................................................................847
Enabling and Disabling sFlow on an Interface.................................................................................847
sFlow Show Commands...................................................................................................................847
Displaying Show sFlow Global................................................................................................... 847










