Users Guide

Removing the RSA Host Keys and Zeroizing Storage ............................................. 860
Configuring When to Re-generate an SSH Key ....................................................... 860
Configuring the SSH Server Key Exchange Algorithm.............................................860
Configuring the HMAC Algorithm for the SSH Server..............................................861
Configuring the SSH Server Cipher List.......................................................................862
Secure Shell Authentication...........................................................................................862
Troubleshooting SSH...................................................................................................... 865
Telnet........................................................................................................................................865
VTY Line and Access-Class Configuration....................................................................... 866
VTY Line Local Authentication and Authorization.................................................... 866
VTY Line Remote Authentication and Authorization................................................867
VTY MAC-SA Filter Support............................................................................................868
Role-Based Access Control.................................................................................................868
Overview of RBAC........................................................................................................... 869
User Roles...........................................................................................................................871
AAA Authentication and Authorization for Roles.......................................................875
Role Accounting...............................................................................................................878
Display Information About User Roles.........................................................................879
44 Service Provider Bridging.................................................................................................881
VLAN Stacking.........................................................................................................................881
Important Points to Remember....................................................................................882
Configure VLAN Stacking...............................................................................................883
Creating Access and Trunk Ports..................................................................................883
Enable VLAN-Stacking for a VLAN............................................................................... 884
Configuring the Protocol Type Value for the Outer VLAN Tag............................. 884
Configuring Dell Networking OS Options for Trunk Ports..................................... 885
Debugging VLAN Stacking.............................................................................................886
VLAN Stacking in Multi-Vendor Networks..................................................................886
VLAN Stacking Packet Drop Precedence......................................................................... 890
Enabling Drop Eligibility.................................................................................................. 891
Honoring the Incoming DEI Value................................................................................891
Marking Egress Packets with a DEI Value................................................................... 892
Dynamic Mode CoS for VLAN Stacking............................................................................ 893
Mapping C-Tag to S-Tag dot1p Values.......................................................................894
Layer 2 Protocol Tunneling................................................................................................. 895
Implementation Information.........................................................................................898
Enabling Layer 2 Protocol Tunneling.......................................................................... 899
Specifying a Destination MAC Address for BPDUs................................................... 899
Setting Rate-Limit BPDUs.............................................................................................. 899
Debugging Layer 2 Protocol Tunneling......................................................................900
Provider Backbone Bridging................................................................................................900
9.10(0.1)
26