Users Guide

Conguring the SSH Server Cipher List............................................................................................................... 777
Conguring the SSH Client Cipher List.................................................................................................................778
Secure Shell Authentication....................................................................................................................................778
Troubleshooting SSH................................................................................................................................................781
Telnet................................................................................................................................................................................781
VTY Line and Access-Class Conguration.................................................................................................................. 781
VTY Line Local Authentication and Authorization............................................................................................... 782
VTY Line Remote Authentication and Authorization...........................................................................................782
VTY MAC-SA Filter Support...................................................................................................................................783
Role-Based Access Control.......................................................................................................................................... 783
Overview of RBAC...................................................................................................................................................784
User Roles.................................................................................................................................................................786
AAA Authentication and Authorization for Roles.................................................................................................789
Role Accounting....................................................................................................................................................... 792
Display Information About User Roles...................................................................................................................792
Two Factor Authentication (2FA)................................................................................................................................ 794
Handling Access-Challenge Message................................................................................................................... 794
Conguring Challenge Response Authentication for SSHv2............................................................................. 794
SMS-OTP Mechanism............................................................................................................................................795
Conguring the System to Drop Certain ICMP Reply Messages............................................................................795
45 Service Provider Bridging.........................................................................................................................797
VLAN Stacking............................................................................................................................................................... 797
Important Points to Remember..............................................................................................................................798
Congure VLAN Stacking.......................................................................................................................................798
Creating Access and Trunk Ports.......................................................................................................................... 799
Enable VLAN-Stacking for a VLAN.......................................................................................................................800
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................800
Conguring Dell Networking OS Options for Trunk Ports..................................................................................800
Debugging VLAN Stacking......................................................................................................................................801
VLAN Stacking in Multi-Vendor Networks...........................................................................................................802
VLAN Stacking Packet Drop Precedence.................................................................................................................. 805
Enabling Drop Eligibility........................................................................................................................................... 805
Honoring the Incoming DEI Value..........................................................................................................................806
Marking Egress Packets with a DEI Value............................................................................................................ 807
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 807
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................808
Layer 2 Protocol Tunneling........................................................................................................................................... 809
Implementation Information..................................................................................................................................... 811
Enabling Layer 2 Protocol Tunneling....................................................................................................................... 811
Specifying a Destination MAC Address for BPDUs..............................................................................................812
Setting Rate-Limit BPDUs.......................................................................................................................................812
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 813
Provider Backbone Bridging..........................................................................................................................................813
46 sFlow........................................................................................................................................................814
Contents
25