Dell S6000-ON Switch User Manual


  Open as PDF
of 1100
 
Configuring the HMAC Algorithm for the SSH Server............................................................... 819
Configuring the SSH Server Cipher List......................................................................................819
Secure Shell Authentication....................................................................................................... 820
Troubleshooting SSH..................................................................................................................823
Telnet.................................................................................................................................................823
VTY Line and Access-Class Configuration...................................................................................... 823
VTY Line Local Authentication and Authorization.....................................................................824
VTY Line Remote Authentication and Authorization.................................................................825
VTY MAC-SA Filter Support........................................................................................................ 825
Role-Based Access Control............................................................................................................. 826
Overview of RBAC.......................................................................................................................826
User Roles................................................................................................................................... 829
AAA Authentication and Authorization for Roles.......................................................................833
Role Accounting......................................................................................................................... 836
Display Information About User Roles....................................................................................... 837
44 Service Provider Bridging.............................................................................839
VLAN Stacking...................................................................................................................................839
Important Points to Remember.................................................................................................840
Configure VLAN Stacking............................................................................................................841
Creating Access and Trunk Ports............................................................................................... 841
Enable VLAN-Stacking for a VLAN............................................................................................. 842
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 842
Configuring Dell Networking OS Options for Trunk Ports....................................................... 843
Debugging VLAN Stacking......................................................................................................... 844
VLAN Stacking in Multi-Vendor Networks.................................................................................844
VLAN Stacking Packet Drop Precedence........................................................................................ 848
Enabling Drop Eligibility..............................................................................................................848
Honoring the Incoming DEI Value.............................................................................................849
Marking Egress Packets with a DEI Value.................................................................................. 850
Dynamic Mode CoS for VLAN Stacking...........................................................................................850
Mapping C-Tag to S-Tag dot1p Values......................................................................................852
Layer 2 Protocol Tunneling..............................................................................................................852
Implementation Information......................................................................................................854
Enabling Layer 2 Protocol Tunneling.........................................................................................855
Specifying a Destination MAC Address for BPDUs.................................................................... 855
Setting Rate-Limit BPDUs...........................................................................................................855
Debugging Layer 2 Protocol Tunneling.....................................................................................856
Provider Backbone Bridging.............................................................................................................856
45 sFlow.................................................................................................................857
Overview............................................................................................................................................857
26