Concept Guide

Two Factor Authentication (2FA)................................................................................................................................ 903
Handling Access-Challenge Message...................................................................................................................904
Conguring Challenge Response Authentication for SSHv2.............................................................................904
SMS-OTP Mechanism............................................................................................................................................904
Conguring the System to Drop Certain ICMP Reply Messages............................................................................905
Dell EMC Networking OS Security Hardening...........................................................................................................906
Dell EMC Networking OS Image Verication.......................................................................................................906
Startup Conguration Verication.........................................................................................................................908
Conguring the root User Password.....................................................................................................................909
Locking Access to GRUB Interface.......................................................................................................................909
Enabling User Lockout for Failed Login Attempts................................................................................................ 910
50 Service Provider Bridging......................................................................................................................... 911
VLAN Stacking................................................................................................................................................................ 911
Important Points to Remember.............................................................................................................................. 912
Congure VLAN Stacking....................................................................................................................................... 912
Creating Access and Trunk Ports........................................................................................................................... 913
Enable VLAN-Stacking for a VLAN........................................................................................................................914
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................914
Conguring Dell EMC Networking OS Options for Trunk Ports.........................................................................914
Debugging VLAN Stacking......................................................................................................................................915
VLAN Stacking in Multi-Vendor Networks............................................................................................................916
VLAN Stacking Packet Drop Precedence.................................................................................................................. 920
Enabling Drop Eligibility........................................................................................................................................... 920
Honoring the Incoming DEI Value...........................................................................................................................921
Marking Egress Packets with a DEI Value.............................................................................................................921
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................922
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................923
Layer 2 Protocol Tunneling........................................................................................................................................... 924
Implementation Information....................................................................................................................................925
Enabling Layer 2 Protocol Tunneling......................................................................................................................926
Specifying a Destination MAC Address for BPDUs.............................................................................................926
Setting Rate-Limit BPDUs......................................................................................................................................926
Debugging Layer 2 Protocol Tunneling..................................................................................................................927
Provider Backbone Bridging......................................................................................................................................... 927
51 sFlow........................................................................................................................................................928
Overview.........................................................................................................................................................................928
Implementation Information..........................................................................................................................................928
Important Points to Remember............................................................................................................................. 929
Enabling Extended sFlow..............................................................................................................................................929
Enabling and Disabling sFlow on an Interface............................................................................................................ 930
Enabling sFlow Max-Header Size Extended...............................................................................................................930
sFlow Show Commands................................................................................................................................................ 931
Displaying Show sFlow Global.................................................................................................................................931
Displaying Show sFlow on an Interface.................................................................................................................932
Contents
27