Users Guide
Configuring the SSH Client Cipher List........................................................................................................738
Secure Shell Authentication........................................................................................................................... 738
Troubleshooting SSH....................................................................................................................................... 741
Telnet........................................................................................................................................................................ 741
VTY Line and Access-Class Configuration........................................................................................................742
VTY Line Local Authentication and Authorization.....................................................................................742
VTY Line Remote Authentication and Authorization................................................................................743
VTY MAC-SA Filter Support............................................................................................................................ 743
Role-Based Access Control................................................................................................................................. 743
Overview of RBAC............................................................................................................................................744
User Roles.......................................................................................................................................................... 746
AAA Authentication and Authorization for Roles.......................................................................................749
Role Accounting............................................................................................................................................... 752
Display Information About User Roles.........................................................................................................753
45 Service Provider Bridging................................................................................................................................755
VLAN Stacking......................................................................................................................................................... 755
Important Points to Remember.................................................................................................................... 756
Configure VLAN Stacking............................................................................................................................... 756
Creating Access and Trunk Ports.................................................................................................................. 757
Enable VLAN-Stacking for a VLAN................................................................................................................ 757
Configuring the Protocol Type Value for the Outer VLAN Tag..............................................................758
Configuring Dell Networking OS Options for Trunk Ports......................................................................758
Debugging VLAN Stacking..............................................................................................................................759
VLAN Stacking in Multi-Vendor Networks..................................................................................................760
VLAN Stacking Packet Drop Precedence..........................................................................................................763
Enabling Drop Eligibility.................................................................................................................................. 763
Honoring the Incoming DEI Value............................................................................................................... 764
Marking Egress Packets with a DEI Value....................................................................................................765
Dynamic Mode CoS for VLAN Stacking.............................................................................................................765
Mapping C-Tag to S-Tag dot1p Values....................................................................................................... 766
Layer 2 Protocol Tunneling..................................................................................................................................767
Implementation Information......................................................................................................................... 769
Enabling Layer 2 Protocol Tunneling...........................................................................................................769
Specifying a Destination MAC Address for BPDUs....................................................................................770
Setting Rate-Limit BPDUs...............................................................................................................................770
Debugging Layer 2 Protocol Tunneling....................................................................................................... 771
Provider Backbone Bridging................................................................................................................................. 771
46 sFlow................................................................................................................................................................... 772
Overview...................................................................................................................................................................772
Implementation Information................................................................................................................................772
Important Points to Remember.....................................................................................................................773
Enabling Extended sFlow......................................................................................................................................773
Enabling and Disabling sFlow on an Interface................................................................................................. 774
Enabling sFlow Max-Header Size Extended..................................................................................................... 774
sFlow Show Commands....................................................................................................................................... 775
9.10(0.1)
24










