White Papers

Conguring the SSH Client Cipher List................................................................................................................. 917
Secure Shell Authentication.................................................................................................................................... 917
Troubleshooting SSH...............................................................................................................................................920
Telnet...............................................................................................................................................................................920
VTY Line and Access-Class Conguration................................................................................................................. 920
VTY Line Local Authentication and Authorization................................................................................................921
VTY Line Remote Authentication and Authorization........................................................................................... 921
VTY MAC-SA Filter Support.................................................................................................................................. 922
Two Factor Authentication (2FA)................................................................................................................................ 922
Handling Access-Challenge Message................................................................................................................... 922
Conguring Challenge Response Authentication for SSHv2............................................................................. 923
SMS-OTP Mechanism............................................................................................................................................ 923
Conguring the System to Drop Certain ICMP Reply Messages............................................................................923
Dell EMC Networking OS Security Hardening...........................................................................................................925
Startup Conguration Verication.........................................................................................................................925
Conguring the root User Password.....................................................................................................................926
Enabling User Lockout for Failed Login Attempts................................................................................................927
50 Service Provider Bridging........................................................................................................................ 928
VLAN Stacking...............................................................................................................................................................928
Important Points to Remember............................................................................................................................. 929
Congure VLAN Stacking.......................................................................................................................................930
Creating Access and Trunk Ports.......................................................................................................................... 930
Enable VLAN-Stacking for a VLAN........................................................................................................................931
Conguring the Protocol Type Value for the Outer VLAN Tag........................................................................... 931
Conguring Options for Trunk Ports......................................................................................................................931
Debugging VLAN Stacking..................................................................................................................................... 932
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 933
VLAN Stacking Packet Drop Precedence.................................................................................................................. 936
Enabling Drop Eligibility........................................................................................................................................... 936
Honoring the Incoming DEI Value.......................................................................................................................... 937
Marking Egress Packets with a DEI Value............................................................................................................ 938
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................938
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................939
Layer 2 Protocol Tunneling........................................................................................................................................... 940
Implementation Information....................................................................................................................................942
Enabling Layer 2 Protocol Tunneling......................................................................................................................942
Specifying a Destination MAC Address for BPDUs.............................................................................................943
Setting Rate-Limit BPDUs......................................................................................................................................943
Debugging Layer 2 Protocol Tunneling..................................................................................................................944
Provider Backbone Bridging.........................................................................................................................................944
51 sFlow........................................................................................................................................................945
Overview.........................................................................................................................................................................945
Implementation Information......................................................................................................................................... 945
Important Points to Remember............................................................................................................................. 946
28
Contents