Users Guide

Configuring When to Re-generate an SSH Key ........................................................................930
Configuring the SSH Server Cipher List......................................................................................931
Configuring the HMAC Algorithm for the SSH Server............................................................... 931
Configuring the SSH Server Cipher List..................................................................................... 932
Secure Shell Authentication....................................................................................................... 933
Troubleshooting SSH..................................................................................................................935
Telnet................................................................................................................................................ 936
VTY Line and Access-Class Configuration...................................................................................... 936
VTY Line Local Authentication and Authorization.....................................................................936
VTY Line Remote Authentication and Authorization.................................................................937
VTY MAC-SA Filter Support.........................................................................................................937
50 Service Provider Bridging.............................................................................939
VLAN Stacking...................................................................................................................................939
Important Points to Remember................................................................................................. 940
Configure VLAN Stacking............................................................................................................941
Creating Access and Trunk Ports............................................................................................... 941
Enable VLAN-Stacking for a VLAN............................................................................................. 942
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 942
Configuring Options for Trunk Ports......................................................................................... 942
Debugging VLAN Stacking..........................................................................................................943
VLAN Stacking in Multi-Vendor Networks.................................................................................944
VLAN Stacking Packet Drop Precedence.........................................................................................947
Enabling Drop Eligibility..............................................................................................................947
Honoring the Incoming DEI Value.............................................................................................948
Marking Egress Packets with a DEI Value.................................................................................. 949
Dynamic Mode CoS for VLAN Stacking...........................................................................................949
Mapping C-Tag to S-Tag dot1p Values......................................................................................951
Layer 2 Protocol Tunneling.............................................................................................................. 951
Implementation Information...................................................................................................... 953
Enabling Layer 2 Protocol Tunneling.........................................................................................953
Specifying a Destination MAC Address for BPDUs....................................................................954
Setting Rate-Limit BPDUs...........................................................................................................954
Debugging Layer 2 Protocol Tunneling.....................................................................................955
Provider Backbone Bridging.............................................................................................................955
51 sFlow.................................................................................................................956
Overview........................................................................................................................................... 956
Implementation Information............................................................................................................956
Important Points to Remember..................................................................................................957
Enabling and Disabling sFlow...........................................................................................................957
Enabling and Disabling sFlow on an Interface.................................................................................957
29