Users Guide

Configuring the SSH Client Cipher List.................................................................................................................774
Secure Shell Authentication................................................................................................................................... 775
Troubleshooting SSH...............................................................................................................................................777
Telnet...............................................................................................................................................................................777
VTY Line and Access-Class Configuration................................................................................................................. 778
VTY Line Local Authentication and Authorization............................................................................................... 778
VTY Line Remote Authentication and Authorization...........................................................................................779
VTY MAC-SA Filter Support...................................................................................................................................779
Role-Based Access Control..........................................................................................................................................779
Overview of RBAC.................................................................................................................................................. 780
User Roles.................................................................................................................................................................782
AAA Authentication and Authorization for Roles.................................................................................................786
Role Accounting.......................................................................................................................................................788
Display Information About User Roles...................................................................................................................789
Two Factor Authentication (2FA)...............................................................................................................................790
Handling Access-Challenge Message.................................................................................................................... 791
Configuring Challenge Response Authentication for SSHv2..............................................................................791
SMS-OTP Mechanism.............................................................................................................................................791
Configuring the System to Drop Certain ICMP Reply Messages............................................................................792
45 Service Provider Bridging........................................................................................................................ 794
VLAN Stacking...............................................................................................................................................................794
Important Points to Remember............................................................................................................................. 795
Configure VLAN Stacking.......................................................................................................................................795
Creating Access and Trunk Ports..........................................................................................................................796
Enable VLAN-Stacking for a VLAN....................................................................................................................... 797
Configuring the Protocol Type Value for the Outer VLAN Tag.........................................................................797
Configuring Dell Networking OS Options for Trunk Ports................................................................................. 797
Debugging VLAN Stacking..................................................................................................................................... 798
VLAN Stacking in Multi-Vendor Networks...........................................................................................................799
VLAN Stacking Packet Drop Precedence..................................................................................................................802
Enabling Drop Eligibility...........................................................................................................................................802
Honoring the Incoming DEI Value..........................................................................................................................803
Marking Egress Packets with a DEI Value............................................................................................................804
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................804
Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 805
Layer 2 Protocol Tunneling.......................................................................................................................................... 806
Implementation Information................................................................................................................................... 808
Enabling Layer 2 Protocol Tunneling.....................................................................................................................808
Specifying a Destination MAC Address for BPDUs............................................................................................ 809
Setting Rate-Limit BPDUs..................................................................................................................................... 809
Debugging Layer 2 Protocol Tunneling................................................................................................................. 810
Provider Backbone Bridging......................................................................................................................................... 810
46 sFlow........................................................................................................................................................ 811
Overview.......................................................................................................................................................................... 811
Contents
25