Configuring the HMAC Algorithm for the SSH Server...............................................................819
Configuring the SSH Server Cipher List......................................................................................819
Secure Shell Authentication.......................................................................................................820
Troubleshooting SSH..................................................................................................................823
Telnet.................................................................................................................................................823
VTY Line and Access-Class Configuration......................................................................................823
VTY Line Local Authentication and Authorization.....................................................................824
VTY Line Remote Authentication and Authorization.................................................................825
VTY MAC-SA Filter Support........................................................................................................825
Role-Based Access Control.............................................................................................................826
Overview of RBAC.......................................................................................................................826
User Roles...................................................................................................................................829
AAA Authentication and Authorization for Roles.......................................................................833
Role Accounting.........................................................................................................................836
Display Information About User Roles.......................................................................................837
44 Service Provider Bridging.............................................................................839
VLAN Stacking...................................................................................................................................839
Important Points to Remember.................................................................................................840
Configure VLAN Stacking............................................................................................................841
Creating Access and Trunk Ports...............................................................................................841
Enable VLAN-Stacking for a VLAN.............................................................................................842
Configuring the Protocol Type Value for the Outer VLAN Tag................................................842
Configuring Dell Networking OS Options for Trunk Ports.......................................................843
Debugging VLAN Stacking.........................................................................................................844
VLAN Stacking in Multi-Vendor Networks.................................................................................844
VLAN Stacking Packet Drop Precedence........................................................................................848
Enabling Drop Eligibility..............................................................................................................848
Honoring the Incoming DEI Value.............................................................................................849
Marking Egress Packets with a DEI Value..................................................................................850
Dynamic Mode CoS for VLAN Stacking...........................................................................................850
Mapping C-Tag to S-Tag dot1p Values......................................................................................852
Layer 2 Protocol Tunneling..............................................................................................................852
Implementation Information......................................................................................................854
Enabling Layer 2 Protocol Tunneling.........................................................................................855
Specifying a Destination MAC Address for BPDUs....................................................................855
Setting Rate-Limit BPDUs...........................................................................................................855
Debugging Layer 2 Protocol Tunneling.....................................................................................856
Provider Backbone Bridging.............................................................................................................856
45 sFlow.................................................................................................................857
Overview............................................................................................................................................857
26