Administrator Guide

Conguring the SSH Server Key Exchange Algorithm............................................................................................. 694
Conguring the HMAC Algorithm for the SSH Server............................................................................................. 694
Conguring the SSH Server Cipher List...................................................................................................................695
Secure Shell Authentication..................................................................................................................................... 696
Troubleshooting SSH................................................................................................................................................698
Telnet.............................................................................................................................................................................698
VTY Line and Access-Class Conguration..................................................................................................................... 699
VTY Line Local Authentication and Authorization.....................................................................................................699
VTY Line Remote Authentication and Authorization.................................................................................................700
VTY MAC-SA Filter Support.................................................................................................................................... 700
Role-Based Access Control............................................................................................................................................700
Overview of RBAC....................................................................................................................................................701
User Roles................................................................................................................................................................703
AAA Authentication and Authorization for Roles...................................................................................................... 706
Role Accounting....................................................................................................................................................... 709
Display Information About User Roles....................................................................................................................... 710
47 Service Provider Bridging...........................................................................................712
VLAN Stacking................................................................................................................................................................712
Important Points to Remember.................................................................................................................................713
Congure VLAN Stacking......................................................................................................................................... 713
Creating Access and Trunk Ports.............................................................................................................................. 714
Enable VLAN-Stacking for a VLAN........................................................................................................................... 714
Conguring the Protocol Type Value for the Outer VLAN Tag...................................................................................715
Conguring Options for Trunk Ports......................................................................................................................... 715
Debugging VLAN Stacking........................................................................................................................................716
VLAN Stacking in Multi-Vendor Networks................................................................................................................ 716
VLAN Stacking Packet Drop Precedence........................................................................................................................721
Enabling Drop Eligibility............................................................................................................................................. 721
Honoring the Incoming DEI Value..............................................................................................................................721
Marking Egress Packets with a DEI Value.................................................................................................................722
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 723
Mapping C-Tag to S-Tag dot1p Values.......................................................................................................................724
Layer 2 Protocol Tunneling............................................................................................................................................. 725
Implementation Information......................................................................................................................................726
Enabling Layer 2 Protocol Tunneling......................................................................................................................... 727
Specifying a Destination MAC Address for BPDUs................................................................................................... 727
Setting Rate-Limit BPDUs........................................................................................................................................ 727
Debugging Layer 2 Protocol Tunneling......................................................................................................................728
Provider Backbone Bridging........................................................................................................................................... 728
48 sFlow.........................................................................................................................729
Overview........................................................................................................................................................................729
Implementation Information............................................................................................................................................729
Important Points to Remember................................................................................................................................ 729
Enabling and Disabling sFlow..........................................................................................................................................730
23