Concept Guide

Two Factor Authentication (2FA)................................................................................................................................ 789
Handling Access-Challenge Message................................................................................................................... 790
Conguring Challenge Response Authentication for SSHv2............................................................................. 790
SMS-OTP Mechanism............................................................................................................................................790
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................791
Dell EMC Networking OS Security Hardening........................................................................................................... 792
Dell EMC Networking OS Image Verication....................................................................................................... 792
Startup Conguration Verication......................................................................................................................... 794
Conguring the root User Password.....................................................................................................................795
Locking Access to GRUB Interface....................................................................................................................... 795
Enabling User Lockout for Failed Login Attempts................................................................................................796
46 Service Provider Bridging.........................................................................................................................797
VLAN Stacking............................................................................................................................................................... 797
Important Points to Remember..............................................................................................................................798
Congure VLAN Stacking.......................................................................................................................................798
Creating Access and Trunk Ports.......................................................................................................................... 799
Enable VLAN-Stacking for a VLAN.......................................................................................................................800
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................800
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................800
Debugging VLAN Stacking......................................................................................................................................801
VLAN Stacking in Multi-Vendor Networks...........................................................................................................802
VLAN Stacking Packet Drop Precedence.................................................................................................................. 806
Enabling Drop Eligibility........................................................................................................................................... 806
Honoring the Incoming DEI Value.......................................................................................................................... 807
Marking Egress Packets with a DEI Value............................................................................................................ 807
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................808
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................. 809
Layer 2 Protocol Tunneling............................................................................................................................................ 810
Implementation Information..................................................................................................................................... 811
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 812
Specifying a Destination MAC Address for BPDUs..............................................................................................812
Setting Rate-Limit BPDUs.......................................................................................................................................812
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 813
Provider Backbone Bridging..........................................................................................................................................813
47 sFlow........................................................................................................................................................814
Overview......................................................................................................................................................................... 814
Implementation Information.......................................................................................................................................... 814
Important Points to Remember.............................................................................................................................. 815
Enabling Extended sFlow.............................................................................................................................................. 815
Enabling and Disabling sFlow on an Interface.............................................................................................................816
Enabling sFlow Max-Header Size Extended............................................................................................................... 816
sFlow Show Commands................................................................................................................................................ 817
Displaying Show sFlow Global.................................................................................................................................817
Displaying Show sFlow on an Interface................................................................................................................. 818
Contents
25