Users Guide
Conguring the SSH Server Cipher List................................................................................................................719
Secure Shell Authentication................................................................................................................................... 720
Troubleshooting SSH............................................................................................................................................... 722
Telnet............................................................................................................................................................................... 722
VTY Line and Access-Class Conguration..................................................................................................................723
VTY Line Local Authentication and Authorization............................................................................................... 723
VTY Line Remote Authentication and Authorization...........................................................................................724
VTY MAC-SA Filter Support...................................................................................................................................724
Role-Based Access Control.......................................................................................................................................... 724
Overview of RBAC...................................................................................................................................................725
User Roles.................................................................................................................................................................727
AAA Authentication and Authorization for Roles.................................................................................................730
Role Accounting....................................................................................................................................................... 733
Display Information About User Roles................................................................................................................... 734
45 Service Provider Bridging........................................................................................................................ 736
VLAN Stacking...............................................................................................................................................................736
Important Points to Remember..............................................................................................................................737
Congure VLAN Stacking....................................................................................................................................... 737
Creating Access and Trunk Ports...........................................................................................................................738
Enable VLAN-Stacking for a VLAN....................................................................................................................... 738
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 739
Conguring Dell Networking OS Options for Trunk Ports.................................................................................. 739
Debugging VLAN Stacking..................................................................................................................................... 740
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 740
VLAN Stacking Packet Drop Precedence...................................................................................................................743
Enabling Drop Eligibility............................................................................................................................................743
Honoring the Incoming DEI Value.......................................................................................................................... 744
Marking Egress Packets with a DEI Value............................................................................................................ 745
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 745
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................746
Layer 2 Protocol Tunneling............................................................................................................................................ 747
Implementation Information....................................................................................................................................749
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 749
Specifying a Destination MAC Address for BPDUs.............................................................................................750
Setting Rate-Limit BPDUs......................................................................................................................................750
Debugging Layer 2 Protocol Tunneling...................................................................................................................751
Provider Backbone Bridging..........................................................................................................................................751
46 sFlow....................................................................................................................................................... 752
Overview.........................................................................................................................................................................752
Implementation Information..........................................................................................................................................752
Important Points to Remember..............................................................................................................................753
Enabling Extended sFlow..............................................................................................................................................753
Enabling and Disabling sFlow on an Interface............................................................................................................ 754
Enabling sFlow Max-Header Size Extended...............................................................................................................754
sFlow Show Commands............................................................................................................................................... 755
24
Contents










