Configuration Task List for Privilege Levels............................................................................... 705RADIUS...............................................................................................................................................710RADIUS Authentication................................................................................................................ 711Configuration Task List for RADIUS............................................................................................ 712TACACS+........................................................................................................................................... 715Configuration Task List for TACACS+.........................................................................................715TACACS+ Remote Authentication..............................................................................................716Command Authorization.............................................................................................................718Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................718Enabling SCP and SSH.......................................................................................................................718Using SCP with SSH to Copy a Software Image.........................................................................719Secure Shell Authentication....................................................................................................... 720Troubleshooting SSH.................................................................................................................. 723Telnet.................................................................................................................................................723VTY Line and Access-Class Configuration.......................................................................................723VTY Line Local Authentication and Authorization..................................................................... 724VTY Line Remote Authentication and Authorization.................................................................724VTY MAC-SA Filter Support.........................................................................................................72543 Service Provider Bridging.................................................................................727VLAN Stacking................................................................................................................................... 727Important Points to Remember..................................................................................................728Configure VLAN Stacking............................................................................................................729Creating Access and Trunk Ports............................................................................................... 729Enable VLAN-Stacking for a VLAN............................................................................................. 730Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 730Configuring Dell Networking OS Options for Trunk Ports........................................................730Debugging VLAN Stacking.......................................................................................................... 731VLAN Stacking in Multi-Vendor Networks................................................................................. 732VLAN Stacking Packet Drop Precedence.........................................................................................735Enabling Drop Eligibility.............................................................................................................. 735Honoring the Incoming DEI Value............................................................................................. 736Marking Egress Packets with a DEI Value................................................................................... 737Dynamic Mode CoS for VLAN Stacking............................................................................................737Mapping C-Tag to S-Tag dot1p Values......................................................................................739Layer 2 Protocol Tunneling.............................................................................................................. 739Implementation Information.......................................................................................................741Enabling Layer 2 Protocol Tunneling......................................................................................... 742Specifying a Destination MAC Address for BPDUs.................................................................... 742Setting Rate-Limit BPDUs........................................................................................................... 742Debugging Layer 2 Protocol Tunneling..................................................................................... 743Provider Backbone Bridging............................................................................................................. 743