Reference Guide

TACACS+ Remote Authentication............................................................................................. 826
Command Authorization............................................................................................................828
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................828
Enabling SCP and SSH......................................................................................................................828
Using SCP with SSH to Copy a Software Image........................................................................829
Secure Shell Authentication....................................................................................................... 830
Troubleshooting SSH..................................................................................................................833
Telnet.................................................................................................................................................833
VTY Line and Access-Class Configuration...................................................................................... 833
VTY Line Local Authentication and Authorization.....................................................................834
VTY Line Remote Authentication and Authorization.................................................................835
VTY MAC-SA Filter Support........................................................................................................ 835
48 Service Provider Bridging................................................................................ 837
VLAN Stacking...................................................................................................................................837
Important Points to Remember................................................................................................. 838
Configure VLAN Stacking........................................................................................................... 839
Creating Access and Trunk Ports...............................................................................................839
Enable VLAN-Stacking for a VLAN.............................................................................................840
Configuring the Protocol Type Value for the Outer VLAN Tag................................................840
Configuring Dell Networking OS Options for Trunk Ports....................................................... 840
Debugging VLAN Stacking..........................................................................................................841
VLAN Stacking in Multi-Vendor Networks.................................................................................842
VLAN Stacking Packet Drop Precedence........................................................................................ 846
Enabling Drop Eligibility..............................................................................................................846
Honoring the Incoming DEI Value............................................................................................. 847
Marking Egress Packets with a DEI Value...................................................................................847
Dynamic Mode CoS for VLAN Stacking...........................................................................................848
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 850
Layer 2 Protocol Tunneling..............................................................................................................850
Implementation Information......................................................................................................852
Enabling Layer 2 Protocol Tunneling.........................................................................................853
Specifying a Destination MAC Address for BPDUs.................................................................... 853
Setting Rate-Limit BPDUs...........................................................................................................853
Debugging Layer 2 Protocol Tunneling.....................................................................................854
Provider Backbone Bridging.............................................................................................................854
49 sFlow..................................................................................................................... 855
Overview........................................................................................................................................... 855
Implementation Information............................................................................................................855
Important Points to Remember................................................................................................. 856
Enabling Extended sFlow................................................................................................................. 856