Configuring the SSH Server Cipher List.....................................................................................804
Secure Shell Authentication.......................................................................................................805
Troubleshooting SSH..................................................................................................................807
Telnet................................................................................................................................................808
VTY Line and Access-Class Configuration......................................................................................808
VTY Line Local Authentication and Authorization....................................................................808
VTY Line Remote Authentication and Authorization................................................................809
VTY MAC-SA Filter Support.........................................................................................................810
Role-Based Access Control..............................................................................................................810
Overview of RBAC.......................................................................................................................811
User Roles....................................................................................................................................814
AAA Authentication and Authorization for Roles.......................................................................817
Role Accounting.........................................................................................................................820
Display Information About User Roles.......................................................................................822
47 Service Provider Bridging.............................................................................824VLAN Stacking...................................................................................................................................824
Important Points to Remember.................................................................................................825
Configure VLAN Stacking...........................................................................................................826
Creating Access and Trunk Ports...............................................................................................826
Enable VLAN-Stacking for a VLAN.............................................................................................827
Configuring the Protocol Type Value for the Outer VLAN Tag................................................827
Configuring Options for Trunk Ports.........................................................................................828
Debugging VLAN Stacking..........................................................................................................829
VLAN Stacking in Multi-Vendor Networks.................................................................................829
VLAN Stacking Packet Drop Precedence.........................................................................................833
Enabling Drop Eligibility..............................................................................................................833
Honoring the Incoming DEI Value.............................................................................................834
Marking Egress Packets with a DEI Value..................................................................................834
Dynamic Mode CoS for VLAN Stacking...........................................................................................835
Mapping C-Tag to S-Tag dot1p Values.....................................................................................836
Layer 2 Protocol Tunneling..............................................................................................................837
Implementation Information......................................................................................................839
Enabling Layer 2 Protocol Tunneling........................................................................................840
Specifying a Destination MAC Address for BPDUs....................................................................840
Setting Rate-Limit BPDUs..........................................................................................................840
Debugging Layer 2 Protocol Tunneling.....................................................................................841
Provider Backbone Bridging.............................................................................................................841
48 sFlow................................................................................................................842Overview...........................................................................................................................................842
Implementation Information............................................................................................................842
25