Concept Guide

Conguring CoA to re-authenticate 802.1x sessions.......................................................................................... 849
Terminating the 802.1x user session......................................................................................................................850
Disabling 802.1x enabled port.................................................................................................................................850
Important points to remember................................................................................................................................851
Conguring replay protection..................................................................................................................................851
Rate-limiting RADIUS packets............................................................................................................................... 852
Conguring time-out value.....................................................................................................................................852
Role-Based Access Control..........................................................................................................................................852
Overview of RBAC.................................................................................................................................................. 853
User Roles................................................................................................................................................................ 855
AAA Authentication and Authorization for Roles................................................................................................ 858
Role Accounting........................................................................................................................................................861
Display Information About User Roles...................................................................................................................862
Two Factor Authentication (2FA)................................................................................................................................ 863
Handling Access-Challenge Message................................................................................................................... 863
Conguring Challenge Response Authentication for SSHv2............................................................................. 863
SMS-OTP Mechanism............................................................................................................................................864
Conguring the System to Drop Certain ICMP Reply Messages............................................................................864
48 Service Provider Bridging........................................................................................................................ 866
VLAN Stacking...............................................................................................................................................................866
Important Points to Remember..............................................................................................................................867
Congure VLAN Stacking.......................................................................................................................................867
Creating Access and Trunk Ports.......................................................................................................................... 868
Enable VLAN-Stacking for a VLAN.......................................................................................................................869
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 869
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................869
Debugging VLAN Stacking..................................................................................................................................... 870
VLAN Stacking in Multi-Vendor Networks............................................................................................................871
VLAN Stacking Packet Drop Precedence...................................................................................................................875
Enabling Drop Eligibility........................................................................................................................................... 875
Honoring the Incoming DEI Value.......................................................................................................................... 876
Marking Egress Packets with a DEI Value............................................................................................................ 876
Dynamic Mode CoS for VLAN Stacking......................................................................................................................877
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................878
Layer 2 Protocol Tunneling............................................................................................................................................879
Implementation Information................................................................................................................................... 880
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 881
Specifying a Destination MAC Address for BPDUs..............................................................................................881
Setting Rate-Limit BPDUs.......................................................................................................................................881
Debugging Layer 2 Protocol Tunneling..................................................................................................................882
Provider Backbone Bridging.........................................................................................................................................882
49 sFlow....................................................................................................................................................... 883
Overview.........................................................................................................................................................................883
Implementation Information..........................................................................................................................................883
26
Contents