Administrator Guide

VTY Line and Access-Class Conguration..................................................................................................................816
VTY Line Local Authentication and Authorization................................................................................................ 817
VTY Line Remote Authentication and Authorization............................................................................................817
VTY MAC-SA Filter Support................................................................................................................................... 818
Role-Based Access Control...........................................................................................................................................818
Overview of RBAC................................................................................................................................................... 819
User Roles................................................................................................................................................................. 821
AAA Authentication and Authorization for Roles.................................................................................................824
Role Accounting....................................................................................................................................................... 827
Display Information About User Roles................................................................................................................... 827
Two Factor Authentication (2FA)................................................................................................................................ 829
Handling Access-Challenge Message................................................................................................................... 829
Conguring Challenge Response Authentication for SSHv2............................................................................. 829
SMS-OTP Mechanism............................................................................................................................................830
Conguring the System to Drop Certain ICMP Reply Messages............................................................................830
49 Service Provider Bridging........................................................................................................................ 832
VLAN Stacking...............................................................................................................................................................832
Important Points to Remember............................................................................................................................. 833
Congure VLAN Stacking.......................................................................................................................................833
Creating Access and Trunk Ports.......................................................................................................................... 834
Enable VLAN-Stacking for a VLAN.......................................................................................................................835
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 835
Conguring Dell Networking OS Options for Trunk Ports..................................................................................835
Debugging VLAN Stacking.....................................................................................................................................836
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 837
VLAN Stacking Packet Drop Precedence................................................................................................................... 841
Enabling Drop Eligibility............................................................................................................................................ 841
Honoring the Incoming DEI Value.......................................................................................................................... 842
Marking Egress Packets with a DEI Value............................................................................................................ 842
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................843
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................844
Layer 2 Protocol Tunneling........................................................................................................................................... 845
Implementation Information....................................................................................................................................846
Enabling Layer 2 Protocol Tunneling......................................................................................................................847
Specifying a Destination MAC Address for BPDUs.............................................................................................847
Setting Rate-Limit BPDUs......................................................................................................................................847
Debugging Layer 2 Protocol Tunneling..................................................................................................................848
Provider Backbone Bridging.........................................................................................................................................848
50 sFlow.......................................................................................................................................................849
Overview.........................................................................................................................................................................849
Implementation Information..........................................................................................................................................849
Important Points to Remember............................................................................................................................. 850
Enabling Extended sFlow..............................................................................................................................................850
Enabling and Disabling sFlow on an Interface.............................................................................................................851
26
Contents