Setup Guide

AAA Authentication and Authorization for Roles................................................................................................. 747
Role Accounting.......................................................................................................................................................750
Display Information About User Roles...................................................................................................................750
Two Factor Authentication (2FA)................................................................................................................................ 752
Handling Access-Challenge Message................................................................................................................... 752
Conguring Challenge Response Authentication for SSHv2............................................................................. 752
SMS-OTP Mechanism............................................................................................................................................ 753
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 753
Dell EMC Networking OS Security Hardening...........................................................................................................755
Dell EMC Networking OS Image Verication....................................................................................................... 755
Startup Conguration Verication......................................................................................................................... 756
Conguring the root User Password..................................................................................................................... 757
Locking Access to GRUB Interface....................................................................................................................... 758
Enabling User Lockout for Failed Login Attempts................................................................................................758
45 Service Provider Bridging........................................................................................................................ 759
VLAN Stacking...............................................................................................................................................................759
Important Points to Remember..............................................................................................................................760
Congure VLAN Stacking.......................................................................................................................................760
Creating Access and Trunk Ports........................................................................................................................... 761
Enable VLAN-Stacking for a VLAN....................................................................................................................... 762
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 762
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 762
Debugging VLAN Stacking..................................................................................................................................... 763
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 764
VLAN Stacking Packet Drop Precedence...................................................................................................................768
Enabling Drop Eligibility........................................................................................................................................... 768
Honoring the Incoming DEI Value.......................................................................................................................... 769
Marking Egress Packets with a DEI Value............................................................................................................ 769
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 770
Mapping C-Tag to S-Tag dot1p Values....................................................................................................................771
Layer 2 Protocol Tunneling............................................................................................................................................772
Implementation Information....................................................................................................................................773
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 774
Specifying a Destination MAC Address for BPDUs............................................................................................. 774
Setting Rate-Limit BPDUs...................................................................................................................................... 774
Debugging Layer 2 Protocol Tunneling..................................................................................................................775
Provider Backbone Bridging......................................................................................................................................... 775
46 sFlow....................................................................................................................................................... 776
Overview.........................................................................................................................................................................776
Implementation Information..........................................................................................................................................776
Important Points to Remember.............................................................................................................................. 777
Enabling Extended sFlow.............................................................................................................................................. 777
Enabling and Disabling sFlow on an Interface.............................................................................................................778
Enabling sFlow Max-Header Size Extended............................................................................................................... 778
24
Contents