White Papers

Table Of Contents
Configuring CoA to bounce 802.1x enabled ports.............................................................................................776
Configuring CoA to re-authenticate 802.1x sessions........................................................................................777
Terminating the 802.1x user session.....................................................................................................................778
Disabling 802.1x enabled port.................................................................................................................................778
Important points to remember............................................................................................................................... 779
Configuring replay protection.................................................................................................................................779
Rate-limiting RADIUS packets............................................................................................................................... 780
Configuring time-out value..................................................................................................................................... 780
Role-Based Access Control.......................................................................................................................................... 780
Overview of RBAC.....................................................................................................................................................781
User Roles................................................................................................................................................................... 783
AAA Authentication and Authorization for Roles.............................................................................................. 786
Role Accounting.........................................................................................................................................................788
Display Information About User Roles..................................................................................................................789
Two Factor Authentication (2FA)...............................................................................................................................790
Handling Access-Challenge Message...................................................................................................................790
Configuring Challenge Response Authentication for SSHv2.......................................................................... 791
SMS-OTP Mechanism.............................................................................................................................................. 791
Configuring the System to Drop Certain ICMP Reply Messages.........................................................................791
Chapter 48: Service Provider Bridging.......................................................................................794
VLAN Stacking.................................................................................................................................................................794
Configure VLAN Stacking....................................................................................................................................... 795
Creating Access and Trunk Ports......................................................................................................................... 796
Enable VLAN-Stacking for a VLAN.......................................................................................................................796
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 797
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................797
Debugging VLAN Stacking......................................................................................................................................798
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 798
VLAN Stacking Packet Drop Precedence.................................................................................................................802
Enabling Drop Eligibility............................................................................................................................................802
Honoring the Incoming DEI Value......................................................................................................................... 802
Marking Egress Packets with a DEI Value.......................................................................................................... 803
Dynamic Mode CoS for VLAN Stacking.................................................................................................................... 803
Mapping C-Tag to S-Tag dot1p Values............................................................................................................... 805
Layer 2 Protocol Tunneling.......................................................................................................................................... 805
Enabling Layer 2 Protocol Tunneling.................................................................................................................... 807
Specifying a Destination MAC Address for BPDUs.......................................................................................... 808
Setting Rate-Limit BPDUs......................................................................................................................................808
Debugging Layer 2 Protocol Tunneling................................................................................................................808
Provider Backbone Bridging.........................................................................................................................................808
Chapter 49: sFlow......................................................................................................................810
Overview............................................................................................................................................................................810
Implementation Information.......................................................................................................................................... 810
Enabling Extended sFlow................................................................................................................................................811
Enabling and Disabling sFlow on an Interface...........................................................................................................812
Enabling sFlow Max-Header Size Extended..............................................................................................................812
sFlow Show Commands................................................................................................................................................. 813
Contents
23