Dell C9000 Series Networking Configuration Manual page 29

Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

TACACS+ Remote Authentication and Authorization............................................. 998
Command Authorization............................................................................................. 1000
Protection from TCP Tiny and Overlapping Fragment Attacks................................. 1000
Enabling SCP and SSH........................................................................................................ 1000
Using SCP with SSH to Copy a Software Image...................................................... 1001
Removing the RSA Host Keys and Zeroizing Storage ........................................... 1002
Configuring When to Re-generate an SSH Key ..................................................... 1003
Configuring the SSH Server Cipher List.....................................................................1003
Configuring the HMAC Algorithm for the SSH Server........................................... 1004
Configuring the HMAC Algorithm for the SSH Client............................................ 1004
Configuring the SSH Server Cipher List.....................................................................1005
Configuring the SSH Client Cipher List..................................................................... 1006
Secure Shell Authentication........................................................................................ 1006
Troubleshooting SSH.................................................................................................... 1009
Telnet..................................................................................................................................... 1009
VTY Line and Access-Class Configuration..................................................................... 1010
VTY Line Local Authentication and Authorization...................................................1010
VTY Line Remote Authentication and Authorization...............................................1011
VTY MAC-SA Filter Support.......................................................................................... 1012
50 Service Provider Bridging............................................................................................... 1013
VLAN Stacking....................................................................................................................... 1013
Important Points to Remember.................................................................................. 1014
Configure VLAN Stacking..............................................................................................1015
Creating Access and Trunk Ports................................................................................ 1015
Enable VLAN-Stacking for a VLAN..............................................................................1016
Configuring Options for Trunk Ports..........................................................................1017
Debugging VLAN Stacking............................................................................................1018
VLAN Stacking in Multi-Vendor Networks................................................................ 1018
VLAN Stacking Packet Drop Precedence........................................................................1022
Enabling Drop Eligibility................................................................................................ 1023
Honoring the Incoming DEI Value............................................................................. 1023
Marking Egress Packets with a DEI Value................................................................. 1024
Dynamic Mode CoS for VLAN Stacking.......................................................................... 1025
Mapping C-Tag to S-Tag dot1p Values.....................................................................1026
Layer 2 Protocol Tunneling................................................................................................1027
Implementation Information....................................................................................... 1029
Enabling Layer 2 Protocol Tunneling........................................................................ 1030
Specifying a Destination MAC Address for BPDUs................................................. 1030
Setting Rate-Limit BPDUs............................................................................................ 1030
Debugging Layer 2 Protocol Tunneling.....................................................................1031
Version 9.10(0.0)
29

Advertisement

Table of Contents
loading

Table of Contents