Concept Guide

Error-cause Values...................................................................................................................................................823
CoA Packet Processing...........................................................................................................................................823
CoA or DM Discard..................................................................................................................................................824
Disconnect Message Processing...........................................................................................................................825
Conguring DAC...................................................................................................................................................... 825
Conguring the port number................................................................................................................................. 825
Conguring shared key........................................................................................................................................... 825
Disconnecting administrative users logged in through RADIUS........................................................................ 826
Conguring CoA to bounce 802.1x enabled ports............................................................................................... 826
Conguring CoA to re-authenticate 802.1x sessions...........................................................................................827
Terminating the 802.1x user session......................................................................................................................828
Disabling 802.1x enabled port................................................................................................................................. 828
Important points to remember............................................................................................................................... 829
Conguring replay protection.................................................................................................................................829
Rate-limiting RADIUS packets............................................................................................................................... 830
Conguring time-out value.....................................................................................................................................830
Role-Based Access Control..........................................................................................................................................830
Overview of RBAC................................................................................................................................................... 831
User Roles.................................................................................................................................................................833
AAA Authentication and Authorization for Roles.................................................................................................836
Role Accounting.......................................................................................................................................................839
Display Information About User Roles...................................................................................................................840
Two Factor Authentication (2FA).................................................................................................................................841
Handling Access-Challenge Message....................................................................................................................841
Conguring Challenge Response Authentication for SSHv2..............................................................................841
SMS-OTP Mechanism............................................................................................................................................842
Conguring the System to Drop Certain ICMP Reply Messages............................................................................842
48 Service Provider Bridging........................................................................................................................ 844
VLAN Stacking...............................................................................................................................................................844
Important Points to Remember............................................................................................................................. 845
Congure VLAN Stacking.......................................................................................................................................845
Creating Access and Trunk Ports.......................................................................................................................... 846
Enable VLAN-Stacking for a VLAN....................................................................................................................... 847
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 847
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 847
Debugging VLAN Stacking.....................................................................................................................................848
VLAN Stacking in Multi-Vendor Networks...........................................................................................................849
VLAN Stacking Packet Drop Precedence.................................................................................................................. 853
Enabling Drop Eligibility........................................................................................................................................... 853
Honoring the Incoming DEI Value.......................................................................................................................... 854
Marking Egress Packets with a DEI Value............................................................................................................ 854
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................855
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................. 856
Layer 2 Protocol Tunneling............................................................................................................................................857
Implementation Information................................................................................................................................... 858
26
Contents