Users Guide

Conguring the SSH Server Cipher List................................................................................................................715
Conguring the SSH Client Cipher List................................................................................................................. 715
Secure Shell Authentication.................................................................................................................................... 716
Troubleshooting SSH................................................................................................................................................718
Telnet................................................................................................................................................................................719
VTY Line and Access-Class Conguration.................................................................................................................. 719
VTY Line Local Authentication and Authorization................................................................................................719
VTY Line Remote Authentication and Authorization...........................................................................................720
VTY MAC-SA Filter Support.................................................................................................................................. 720
Role-Based Access Control...........................................................................................................................................721
Overview of RBAC................................................................................................................................................... 721
User Roles.................................................................................................................................................................723
AAA Authentication and Authorization for Roles.................................................................................................726
Role Accounting....................................................................................................................................................... 729
Display Information About User Roles...................................................................................................................730
46 Service Provider Bridging........................................................................................................................ 732
VLAN Stacking...............................................................................................................................................................732
Important Points to Remember..............................................................................................................................733
Congure VLAN Stacking.......................................................................................................................................733
Creating Access and Trunk Ports...........................................................................................................................734
Enable VLAN-Stacking for a VLAN....................................................................................................................... 734
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 735
Conguring Dell Networking OS Options for Trunk Ports.................................................................................. 735
Debugging VLAN Stacking..................................................................................................................................... 736
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 736
VLAN Stacking Packet Drop Precedence...................................................................................................................739
Enabling Drop Eligibility........................................................................................................................................... 739
Honoring the Incoming DEI Value.......................................................................................................................... 740
Marking Egress Packets with a DEI Value............................................................................................................. 741
Dynamic Mode CoS for VLAN Stacking...................................................................................................................... 741
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................742
Layer 2 Protocol Tunneling............................................................................................................................................743
Implementation Information....................................................................................................................................745
Enabling Layer 2 Protocol Tunneling......................................................................................................................745
Specifying a Destination MAC Address for BPDUs............................................................................................. 746
Setting Rate-Limit BPDUs...................................................................................................................................... 746
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 747
Provider Backbone Bridging..........................................................................................................................................747
47 sFlow........................................................................................................................................................748
Overview.........................................................................................................................................................................748
Implementation Information..........................................................................................................................................748
Important Points to Remember..............................................................................................................................749
Enabling Extended sFlow.............................................................................................................................................. 749
Important Points to Remember............................................................................................................................. 750
Enabling and Disabling sFlow on an Interface............................................................................................................. 751
24
Contents