Administrator Guide

VTY Line Remote Authentication and Authorization...........................................................................................819
VTY MAC-SA Filter Support...................................................................................................................................819
Role-Based Access Control.......................................................................................................................................... 819
Overview of RBAC.................................................................................................................................................. 820
User Roles.................................................................................................................................................................822
AAA Authentication and Authorization for Roles................................................................................................ 826
Role Accounting.......................................................................................................................................................828
Display Information About User Roles.................................................................................................................. 829
Two Factor Authentication (2FA)...............................................................................................................................830
Handling Access-Challenge Message....................................................................................................................831
Configuring Challenge Response Authentication for SSHv2..............................................................................831
SMS-OTP Mechanism.............................................................................................................................................831
Configuring the System to Drop Certain ICMP Reply Messages............................................................................832
49 Service Provider Bridging........................................................................................................................ 834
VLAN Stacking...............................................................................................................................................................834
Important Points to Remember.............................................................................................................................835
Configure VLAN Stacking...................................................................................................................................... 835
Creating Access and Trunk Ports..........................................................................................................................836
Enable VLAN-Stacking for a VLAN....................................................................................................................... 837
Configuring the Protocol Type Value for the Outer VLAN Tag.........................................................................837
Configuring Dell Networking OS Options for Trunk Ports................................................................................. 837
Debugging VLAN Stacking.....................................................................................................................................838
VLAN Stacking in Multi-Vendor Networks.......................................................................................................... 839
VLAN Stacking Packet Drop Precedence..................................................................................................................843
Enabling Drop Eligibility........................................................................................................................................... 843
Honoring the Incoming DEI Value..........................................................................................................................844
Marking Egress Packets with a DEI Value............................................................................................................844
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................845
Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 846
Layer 2 Protocol Tunneling...........................................................................................................................................847
Implementation Information................................................................................................................................... 848
Enabling Layer 2 Protocol Tunneling.....................................................................................................................849
Specifying a Destination MAC Address for BPDUs............................................................................................ 849
Setting Rate-Limit BPDUs......................................................................................................................................849
Debugging Layer 2 Protocol Tunneling.................................................................................................................850
Provider Backbone Bridging.........................................................................................................................................850
50 sFlow....................................................................................................................................................... 851
Overview......................................................................................................................................................................... 851
Implementation Information..........................................................................................................................................851
Important Points to Remember.............................................................................................................................852
Enabling Extended sFlow..............................................................................................................................................852
Enabling and Disabling sFlow on an Interface............................................................................................................853
Enabling sFlow Max-Header Size Extended.............................................................................................................. 853
sFlow Show Commands............................................................................................................................................... 854
26
Contents