Users Guide

Conguring the SSH Client Cipher List.................................................................................................................735
Secure Shell Authentication................................................................................................................................... 736
Troubleshooting SSH............................................................................................................................................... 738
Telnet...............................................................................................................................................................................739
VTY Line and Access-Class Conguration................................................................................................................. 739
VTY Line Local Authentication and Authorization............................................................................................... 739
VTY Line Remote Authentication and Authorization...........................................................................................740
VTY MAC-SA Filter Support...................................................................................................................................740
Role-Based Access Control........................................................................................................................................... 741
Overview of RBAC....................................................................................................................................................741
User Roles.................................................................................................................................................................743
AAA Authentication and Authorization for Roles.................................................................................................746
Role Accounting....................................................................................................................................................... 749
Display Information About User Roles...................................................................................................................750
45 Service Provider Bridging........................................................................................................................ 752
VLAN Stacking...............................................................................................................................................................752
Important Points to Remember..............................................................................................................................753
Congure VLAN Stacking.......................................................................................................................................753
Creating Access and Trunk Ports.......................................................................................................................... 754
Enable VLAN-Stacking for a VLAN....................................................................................................................... 754
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 755
Conguring Dell Networking OS Options for Trunk Ports..................................................................................755
Debugging VLAN Stacking..................................................................................................................................... 756
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 756
VLAN Stacking Packet Drop Precedence.................................................................................................................. 760
Enabling Drop Eligibility........................................................................................................................................... 760
Honoring the Incoming DEI Value........................................................................................................................... 761
Marking Egress Packets with a DEI Value............................................................................................................ 762
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 762
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................763
Layer 2 Protocol Tunneling............................................................................................................................................764
Implementation Information....................................................................................................................................766
Enabling Layer 2 Protocol Tunneling......................................................................................................................766
Specifying a Destination MAC Address for BPDUs............................................................................................. 767
Setting Rate-Limit BPDUs...................................................................................................................................... 767
Debugging Layer 2 Protocol Tunneling..................................................................................................................768
Provider Backbone Bridging......................................................................................................................................... 768
46 sFlow....................................................................................................................................................... 769
Overview.........................................................................................................................................................................769
Implementation Information..........................................................................................................................................769
Important Points to Remember..............................................................................................................................770
Enabling Extended sFlow.............................................................................................................................................. 770
Enabling and Disabling sFlow on an Interface............................................................................................................. 771
Enabling sFlow Max-Header Size Extended................................................................................................................771
sFlow Show Commands................................................................................................................................................772
24
Contents