Administrator Guide

VTY Line and Access-Class Conguration..................................................................................................................819
VTY Line Local Authentication and Authorization............................................................................................... 820
VTY Line Remote Authentication and Authorization...........................................................................................820
VTY MAC-SA Filter Support................................................................................................................................... 821
Role-Based Access Control...........................................................................................................................................821
Overview of RBAC...................................................................................................................................................822
User Roles.................................................................................................................................................................824
AAA Authentication and Authorization for Roles.................................................................................................827
Role Accounting.......................................................................................................................................................830
Display Information About User Roles...................................................................................................................830
Two Factor Authentication (2FA)................................................................................................................................ 832
Handling Access-Challenge Message................................................................................................................... 832
Conguring Challenge Response Authentication for SSHv2............................................................................. 832
SMS-OTP Mechanism............................................................................................................................................833
Conguring the System to Drop Certain ICMP Reply Messages............................................................................833
49 Service Provider Bridging........................................................................................................................ 835
VLAN Stacking...............................................................................................................................................................835
Important Points to Remember............................................................................................................................. 836
Congure VLAN Stacking.......................................................................................................................................836
Creating Access and Trunk Ports...........................................................................................................................837
Enable VLAN-Stacking for a VLAN.......................................................................................................................838
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 838
Conguring Dell Networking OS Options for Trunk Ports..................................................................................838
Debugging VLAN Stacking.....................................................................................................................................839
VLAN Stacking in Multi-Vendor Networks...........................................................................................................840
VLAN Stacking Packet Drop Precedence.................................................................................................................. 844
Enabling Drop Eligibility........................................................................................................................................... 844
Honoring the Incoming DEI Value.......................................................................................................................... 845
Marking Egress Packets with a DEI Value............................................................................................................ 845
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................846
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................847
Layer 2 Protocol Tunneling........................................................................................................................................... 848
Implementation Information....................................................................................................................................849
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 850
Specifying a Destination MAC Address for BPDUs.............................................................................................850
Setting Rate-Limit BPDUs......................................................................................................................................850
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 851
Provider Backbone Bridging..........................................................................................................................................851
50 sFlow.......................................................................................................................................................852
Overview.........................................................................................................................................................................852
Implementation Information..........................................................................................................................................852
Important Points to Remember............................................................................................................................. 853
Enabling Extended sFlow..............................................................................................................................................853
Enabling and Disabling sFlow on an Interface............................................................................................................ 854
26
Contents