Administrator Guide

Conguring the SSH Server Cipher List...............................................................................................................939
Conguring the SSH Client Cipher List................................................................................................................ 939
Secure Shell Authentication................................................................................................................................... 940
Troubleshooting SSH...............................................................................................................................................942
Telnet...............................................................................................................................................................................943
VTY Line and Access-Class Conguration................................................................................................................. 943
VTY Line Local Authentication and Authorization............................................................................................... 943
VTY Line Remote Authentication and Authorization...........................................................................................944
VTY MAC-SA Filter Support.................................................................................................................................. 944
Two Factor Authentication (2FA)................................................................................................................................ 945
Handling Access-Challenge Message................................................................................................................... 945
Conguring Challenge Response Authentication for SSHv2............................................................................. 945
SMS-OTP Mechanism............................................................................................................................................946
Conguring the System to Drop Certain ICMP Reply Messages............................................................................946
Dell EMC Networking OS Security Hardening...........................................................................................................948
Startup Conguration Verication.........................................................................................................................948
Conguring the root User Password.....................................................................................................................949
Enabling User Lockout for Failed Login Attempts............................................................................................... 949
51 Service Provider Bridging.........................................................................................................................950
VLAN Stacking...............................................................................................................................................................950
Important Points to Remember.............................................................................................................................. 951
Congure VLAN Stacking.......................................................................................................................................952
Creating Access and Trunk Ports.......................................................................................................................... 952
Enable VLAN-Stacking for a VLAN.......................................................................................................................953
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 953
Conguring Options for Trunk Ports.....................................................................................................................953
Debugging VLAN Stacking.....................................................................................................................................954
VLAN Stacking in Multi-Vendor Networks...........................................................................................................955
VLAN Stacking Packet Drop Precedence.................................................................................................................. 958
Enabling Drop Eligibility........................................................................................................................................... 958
Honoring the Incoming DEI Value..........................................................................................................................959
Marking Egress Packets with a DEI Value............................................................................................................960
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................960
Mapping C-Tag to S-Tag dot1p Values................................................................................................................... 961
Layer 2 Protocol Tunneling........................................................................................................................................... 962
Implementation Information....................................................................................................................................964
Enabling Layer 2 Protocol Tunneling......................................................................................................................964
Specifying a Destination MAC Address for BPDUs.............................................................................................965
Setting Rate-Limit BPDUs......................................................................................................................................965
Debugging Layer 2 Protocol Tunneling................................................................................................................. 966
Provider Backbone Bridging.........................................................................................................................................966
52 sFlow....................................................................................................................................................... 967
Overview.........................................................................................................................................................................967
Implementation Information..........................................................................................................................................967
Contents
29