Secure Shell Authentication....................................................................................................... 794
Troubleshooting SSH..................................................................................................................796
Telnet.................................................................................................................................................797
VTY Line and Access-Class Configuration.......................................................................................797
VTY Line Local Authentication and Authorization..................................................................... 797
VTY Line Remote Authentication and Authorization.................................................................798
VTY MAC-SA Filter Support........................................................................................................ 799
Role-Based Access Control..............................................................................................................799
Overview of RBAC...................................................................................................................... 800
User Roles................................................................................................................................... 802
AAA Authentication and Authorization for Roles...................................................................... 806
Role Accounting......................................................................................................................... 809
Display Information About User Roles....................................................................................... 810
44 Service Provider Bridging.............................................................................812
VLAN Stacking................................................................................................................................... 812
Important Points to Remember..................................................................................................813
Configure VLAN Stacking............................................................................................................814
Creating Access and Trunk Ports............................................................................................... 814
Enable VLAN-Stacking for a VLAN..............................................................................................815
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................815
Configuring Dell Networking OS Options for Trunk Ports........................................................815
Debugging VLAN Stacking..........................................................................................................816
VLAN Stacking in Multi-Vendor Networks..................................................................................817
VLAN Stacking Packet Drop Precedence........................................................................................ 820
Enabling Drop Eligibility..............................................................................................................820
Honoring the Incoming DEI Value............................................................................................. 821
Marking Egress Packets with a DEI Value.................................................................................. 822
Dynamic Mode CoS for VLAN Stacking...........................................................................................822
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 824
Layer 2 Protocol Tunneling..............................................................................................................824
Implementation Information......................................................................................................826
Enabling Layer 2 Protocol Tunneling......................................................................................... 827
Specifying a Destination MAC Address for BPDUs.................................................................... 827
Setting Rate-Limit BPDUs...........................................................................................................827
Debugging Layer 2 Protocol Tunneling.....................................................................................828
Provider Backbone Bridging.............................................................................................................828
45 sFlow................................................................................................................ 829
Overview........................................................................................................................................... 829
Implementation Information............................................................................................................829
Important Points to Remember................................................................................................. 830
26