Owners Manual
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 835
Enabling SCP and SSH...................................................................................................................... 835
Using SCP with SSH to Copy a Software Image........................................................................836
Removing the RSA Host Keys and Zeroizing Storage .............................................................. 836
Configuring When to Re-generate an SSH Key ........................................................................837
Configuring the SSH Server Key Exchange Algorithm...............................................................837
Configuring the HMAC Algorithm for the SSH Server...............................................................838
Configuring the SSH Server Cipher List..................................................................................... 838
Secure Shell Authentication....................................................................................................... 839
Troubleshooting SSH..................................................................................................................842
Telnet................................................................................................................................................ 842
VTY Line and Access-Class Configuration...................................................................................... 842
VTY Line Local Authentication and Authorization.....................................................................843
VTY Line Remote Authentication and Authorization.................................................................843
VTY MAC-SA Filter Support........................................................................................................ 844
Role-Based Access Control............................................................................................................. 844
Overview of RBAC.......................................................................................................................845
User Roles....................................................................................................................................847
AAA Authentication and Authorization for Roles....................................................................... 851
Role Accounting......................................................................................................................... 854
Display Information About User Roles....................................................................................... 855
49 Service Provider Bridging.............................................................................857
VLAN Stacking...................................................................................................................................857
Important Points to Remember................................................................................................. 858
Configure VLAN Stacking........................................................................................................... 859
Creating Access and Trunk Ports............................................................................................... 859
Enable VLAN-Stacking for a VLAN.............................................................................................860
Configuring the Protocol Type Value for the Outer VLAN Tag................................................860
Configuring Dell Networking OS Options for Trunk Ports....................................................... 860
Debugging VLAN Stacking..........................................................................................................861
VLAN Stacking in Multi-Vendor Networks.................................................................................862
VLAN Stacking Packet Drop Precedence........................................................................................ 866
Enabling Drop Eligibility..............................................................................................................866
Honoring the Incoming DEI Value............................................................................................. 867
Marking Egress Packets with a DEI Value...................................................................................867
Dynamic Mode CoS for VLAN Stacking...........................................................................................868
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 869
Layer 2 Protocol Tunneling..............................................................................................................870
Implementation Information...................................................................................................... 872
Enabling Layer 2 Protocol Tunneling......................................................................................... 873
Specifying a Destination MAC Address for BPDUs.................................................................... 873










