Reference Guide

Configuration Task List for TACACS+........................................................................................ 759
TACACS+ Remote Authentication............................................................................................. 760
Command Authorization............................................................................................................ 762
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 762
Enabling SCP and SSH...................................................................................................................... 762
Using SCP with SSH to Copy a Software Image........................................................................ 763
Secure Shell Authentication....................................................................................................... 764
Troubleshooting SSH.................................................................................................................. 767
Telnet.................................................................................................................................................767
VTY Line and Access-Class Configuration.......................................................................................767
VTY Line Local Authentication and Authorization.....................................................................768
VTY Line Remote Authentication and Authorization.................................................................769
VTY MAC-SA Filter Support........................................................................................................ 769
42 Service Provider Bridging................................................................................. 771
VLAN Stacking....................................................................................................................................771
Important Points to Remember..................................................................................................772
Configure VLAN Stacking............................................................................................................773
Creating Access and Trunk Ports................................................................................................773
Enable VLAN-Stacking for a VLAN..............................................................................................774
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................774
Configuring Dell Networking OS Options for Trunk Ports........................................................774
Debugging VLAN Stacking.......................................................................................................... 775
VLAN Stacking in Multi-Vendor Networks................................................................................. 776
VLAN Stacking Packet Drop Precedence.........................................................................................779
Enabling Drop Eligibility.............................................................................................................. 779
Honoring the Incoming DEI Value.............................................................................................780
Marking Egress Packets with a DEI Value...................................................................................781
Dynamic Mode CoS for VLAN Stacking............................................................................................781
Mapping C-Tag to S-Tag dot1p Values......................................................................................783
Layer 2 Protocol Tunneling.............................................................................................................. 783
Implementation Information...................................................................................................... 785
Enabling Layer 2 Protocol Tunneling.........................................................................................786
Specifying a Destination MAC Address for BPDUs.................................................................... 786
Setting Rate-Limit BPDUs...........................................................................................................786
Debugging Layer 2 Protocol Tunneling..................................................................................... 787
Provider Backbone Bridging............................................................................................................. 787
43 sFlow..................................................................................................................... 789
Overview........................................................................................................................................... 789
Implementation Information............................................................................................................789
Important Points to Remember................................................................................................. 790