EasyManua.ls Logo

Dell S6000–ON

Dell S6000–ON
1080 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Secure Shell Authentication....................................................................................................... 794
Troubleshooting SSH..................................................................................................................796
Telnet.................................................................................................................................................797
VTY Line and Access-Class Configuration.......................................................................................797
VTY Line Local Authentication and Authorization..................................................................... 797
VTY Line Remote Authentication and Authorization.................................................................798
VTY MAC-SA Filter Support........................................................................................................ 799
Role-Based Access Control..............................................................................................................799
Overview of RBAC...................................................................................................................... 800
User Roles................................................................................................................................... 802
AAA Authentication and Authorization for Roles...................................................................... 806
Role Accounting......................................................................................................................... 809
Display Information About User Roles....................................................................................... 810
44 Service Provider Bridging.............................................................................812
VLAN Stacking................................................................................................................................... 812
Important Points to Remember..................................................................................................813
Configure VLAN Stacking............................................................................................................814
Creating Access and Trunk Ports............................................................................................... 814
Enable VLAN-Stacking for a VLAN..............................................................................................815
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................815
Configuring Dell Networking OS Options for Trunk Ports........................................................815
Debugging VLAN Stacking..........................................................................................................816
VLAN Stacking in Multi-Vendor Networks..................................................................................817
VLAN Stacking Packet Drop Precedence........................................................................................ 820
Enabling Drop Eligibility..............................................................................................................820
Honoring the Incoming DEI Value............................................................................................. 821
Marking Egress Packets with a DEI Value.................................................................................. 822
Dynamic Mode CoS for VLAN Stacking...........................................................................................822
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 824
Layer 2 Protocol Tunneling..............................................................................................................824
Implementation Information......................................................................................................826
Enabling Layer 2 Protocol Tunneling......................................................................................... 827
Specifying a Destination MAC Address for BPDUs.................................................................... 827
Setting Rate-Limit BPDUs...........................................................................................................827
Debugging Layer 2 Protocol Tunneling.....................................................................................828
Provider Backbone Bridging.............................................................................................................828
45 sFlow................................................................................................................ 829
Overview........................................................................................................................................... 829
Implementation Information............................................................................................................829
Important Points to Remember................................................................................................. 830
26

Table of Contents

Other manuals for Dell S6000–ON

Related product manuals