Reference Guide

Configuration Task List for Privilege Levels............................................................................... 705
RADIUS...............................................................................................................................................710
RADIUS Authentication................................................................................................................711
Configuration Task List for RADIUS............................................................................................ 712
TACACS+........................................................................................................................................... 715
Configuration Task List for TACACS+.........................................................................................715
TACACS+ Remote Authentication..............................................................................................716
Command Authorization.............................................................................................................718
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................718
Enabling SCP and SSH.......................................................................................................................718
Using SCP with SSH to Copy a Software Image.........................................................................719
Secure Shell Authentication....................................................................................................... 720
Troubleshooting SSH.................................................................................................................. 723
Telnet.................................................................................................................................................723
VTY Line and Access-Class Configuration.......................................................................................723
VTY Line Local Authentication and Authorization..................................................................... 724
VTY Line Remote Authentication and Authorization.................................................................724
VTY MAC-SA Filter Support.........................................................................................................725
43 Service Provider Bridging.................................................................................727
VLAN Stacking................................................................................................................................... 727
Important Points to Remember..................................................................................................728
Configure VLAN Stacking............................................................................................................729
Creating Access and Trunk Ports............................................................................................... 729
Enable VLAN-Stacking for a VLAN............................................................................................. 730
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 730
Configuring Dell Networking OS Options for Trunk Ports........................................................730
Debugging VLAN Stacking.......................................................................................................... 731
VLAN Stacking in Multi-Vendor Networks................................................................................. 732
VLAN Stacking Packet Drop Precedence.........................................................................................735
Enabling Drop Eligibility.............................................................................................................. 735
Honoring the Incoming DEI Value............................................................................................. 736
Marking Egress Packets with a DEI Value...................................................................................737
Dynamic Mode CoS for VLAN Stacking............................................................................................737
Mapping C-Tag to S-Tag dot1p Values......................................................................................739
Layer 2 Protocol Tunneling.............................................................................................................. 739
Implementation Information.......................................................................................................741
Enabling Layer 2 Protocol Tunneling......................................................................................... 742
Specifying a Destination MAC Address for BPDUs.................................................................... 742
Setting Rate-Limit BPDUs........................................................................................................... 742
Debugging Layer 2 Protocol Tunneling.....................................................................................743
Provider Backbone Bridging.............................................................................................................743