Dell MXL 10/40GbE Switch User Manual


  Open as PDF
of 1094
 
Configuring the SSH Server Cipher List.....................................................................................804
Secure Shell Authentication....................................................................................................... 805
Troubleshooting SSH..................................................................................................................807
Telnet................................................................................................................................................ 808
VTY Line and Access-Class Configuration......................................................................................808
VTY Line Local Authentication and Authorization.................................................................... 808
VTY Line Remote Authentication and Authorization................................................................ 809
VTY MAC-SA Filter Support.........................................................................................................810
Role-Based Access Control..............................................................................................................810
Overview of RBAC....................................................................................................................... 811
User Roles....................................................................................................................................814
AAA Authentication and Authorization for Roles....................................................................... 817
Role Accounting......................................................................................................................... 820
Display Information About User Roles.......................................................................................822
47 Service Provider Bridging.............................................................................824
VLAN Stacking...................................................................................................................................824
Important Points to Remember................................................................................................. 825
Configure VLAN Stacking........................................................................................................... 826
Creating Access and Trunk Ports...............................................................................................826
Enable VLAN-Stacking for a VLAN............................................................................................. 827
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 827
Configuring Options for Trunk Ports......................................................................................... 828
Debugging VLAN Stacking..........................................................................................................829
VLAN Stacking in Multi-Vendor Networks.................................................................................829
VLAN Stacking Packet Drop Precedence.........................................................................................833
Enabling Drop Eligibility..............................................................................................................833
Honoring the Incoming DEI Value.............................................................................................834
Marking Egress Packets with a DEI Value.................................................................................. 834
Dynamic Mode CoS for VLAN Stacking...........................................................................................835
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 836
Layer 2 Protocol Tunneling.............................................................................................................. 837
Implementation Information......................................................................................................839
Enabling Layer 2 Protocol Tunneling........................................................................................ 840
Specifying a Destination MAC Address for BPDUs....................................................................840
Setting Rate-Limit BPDUs.......................................................................................................... 840
Debugging Layer 2 Protocol Tunneling..................................................................................... 841
Provider Backbone Bridging.............................................................................................................841
48 sFlow................................................................................................................ 842
Overview........................................................................................................................................... 842
Implementation Information............................................................................................................842
25