Service Manual

Configuration Task List for TACACS+......................................................................... 946
Command Authorization................................................................................................948
Protection from TCP Tiny and Overlapping Fragment Attacks................................... 949
Enabling SCP and SSH.......................................................................................................... 949
Using SCP with SSH to Copy a Software Image........................................................950
Secure Shell Authentication........................................................................................... 951
Enabling SSH Authentication by Password................................................................. 951
Using RSA Authentication of SSH................................................................................. 952
Configuring Host-Based SSH Authentication............................................................ 952
Using Client-Based SSH Authentication..................................................................... 954
Configuring the HMAC Algorithm for the SSH Server..............................................954
Configuring the HMAC Algorithm for the SSH Client.............................................. 955
Configuring the SSH Server Cipher List.......................................................................955
Configuring the SSH Client Cipher List....................................................................... 956
Troubleshooting SSH.......................................................................................................957
Telnet........................................................................................................................................ 957
VTY Line and Access-Class Configuration........................................................................957
VTY Line Local Authentication and Authorization.................................................... 958
VTY Line Remote Authentication and Authorization................................................959
VTY MAC-SA Filter Support............................................................................................959
53 Service Provider Bridging.................................................................................................960
VLAN Stacking........................................................................................................................ 960
Important Points to Remember.................................................................................... 961
Configure VLAN Stacking.....................................................................................................962
Related Configuration Tasks..........................................................................................962
Creating Access and Trunk Ports..................................................................................962
Enable VLAN-Stacking for a VLAN................................................................................963
Configuring the Protocol Type Value for the Outer VLAN Tag..............................963
Dell Networking OS Options for Trunk Ports............................................................ 964
Debugging VLAN Stacking............................................................................................. 965
VLAN Stacking in Multi-Vendor Networks..................................................................965
VLAN Stacking Packet Drop Precedence......................................................................... 968
Enabling Drop Eligibility..................................................................................................968
Honoring the Incoming DEI Value............................................................................... 969
Marking Egress Packets with a DEI Value....................................................................970
Dynamic Mode CoS for VLAN Stacking.............................................................................971
Mapping C-Tag to S-Tag dot1p Values....................................................................... 972
Layer 2 Protocol Tunneling..................................................................................................973
Implementation Information..........................................................................................975
Enabling Layer 2 Protocol Tunneling...........................................................................976
Specifying a Destination MAC Address for BPDUs....................................................976
29