Users Guide

Configuring the HMAC Algorithm for the SSH Server...........................................................................................684
Configuring the SSH Server Cipher List.................................................................................................................. 685
Secure Shell Authentication.......................................................................................................................................685
Troubleshooting SSH.................................................................................................................................................. 687
Telnet.................................................................................................................................................................................. 687
VTY Line and Access-Class Configuration.....................................................................................................................688
VTY Line Local Authentication and Authorization...................................................................................................688
VTY Line Remote Authentication and Authorization..............................................................................................688
VTY MAC-SA Filter Support......................................................................................................................................689
Role-Based Access Control............................................................................................................................................. 689
Overview of RBAC......................................................................................................................................................690
User Roles.....................................................................................................................................................................691
AAA Authentication and Authorization for Roles.................................................................................................... 694
Role Accounting...........................................................................................................................................................697
Display Information About User Roles...................................................................................................................... 698
Chapter 48: Service Provider Bridging.......................................................................................... 700
VLAN Stacking.................................................................................................................................................................. 700
Configure VLAN Stacking........................................................................................................................................... 701
Creating Access and Trunk Ports..............................................................................................................................702
Enable VLAN-Stacking for a VLAN...........................................................................................................................702
Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................................703
Configuring Dell Networking OS Options for Trunk Ports..................................................................................... 703
Debugging VLAN Stacking.........................................................................................................................................704
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. 704
VLAN Stacking Packet Drop Precedence......................................................................................................................708
Enabling Drop Eligibility............................................................................................................................................... 708
Honoring the Incoming DEI Value..............................................................................................................................708
Marking Egress Packets with a DEI Value............................................................................................................... 709
Dynamic Mode CoS for VLAN Stacking.........................................................................................................................709
Mapping C-Tag to S-Tag dot1p Values......................................................................................................................711
Layer 2 Protocol Tunneling................................................................................................................................................711
Enabling Layer 2 Protocol Tunneling..........................................................................................................................713
Specifying a Destination MAC Address for BPDUs................................................................................................. 714
Setting Rate-Limit BPDUs.......................................................................................................................................... 714
Debugging Layer 2 Protocol Tunneling......................................................................................................................714
Provider Backbone Bridging............................................................................................................................................. 714
Chapter 49: sFlow........................................................................................................................716
Overview............................................................................................................................................................................. 716
Implementation Information..............................................................................................................................................716
Enabling Extended sFlow.................................................................................................................................................. 717
Enabling and Disabling sFlow on an Interface.................................................................................................................718
Enabling sFlow Max-Header Size Extended...................................................................................................................718
sFlow Show Commands....................................................................................................................................................719
Displaying Show sFlow Global.....................................................................................................................................719
Displaying Show sFlow on an Interface.....................................................................................................................719
Displaying Show sFlow on a Stack-unit....................................................................................................................720
Configuring Specify Collectors........................................................................................................................................ 720
22
Contents