Concept Guide

Display Information About User Roles...................................................................................................................864
Two Factor Authentication (2FA)................................................................................................................................865
Handling Access-Challenge Message................................................................................................................... 866
Conguring Challenge Response Authentication for SSHv2.............................................................................866
SMS-OTP Mechanism............................................................................................................................................866
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 867
Dell EMC Networking OS Security Hardening...........................................................................................................868
Dell EMC Networking OS Image Verication.......................................................................................................868
Startup Conguration Verication......................................................................................................................... 870
Conguring the root User Password......................................................................................................................871
Locking Access to GRUB Interface........................................................................................................................ 871
Enabling User Lockout for Failed Login Attempts................................................................................................872
48 Service Provider Bridging.........................................................................................................................873
VLAN Stacking............................................................................................................................................................... 873
Important Points to Remember..............................................................................................................................874
Congure VLAN Stacking....................................................................................................................................... 874
Creating Access and Trunk Ports...........................................................................................................................875
Enable VLAN-Stacking for a VLAN....................................................................................................................... 876
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 876
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 876
Debugging VLAN Stacking......................................................................................................................................877
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 878
VLAN Stacking Packet Drop Precedence................................................................................................................... 881
Enabling Drop Eligibility............................................................................................................................................ 881
Honoring the Incoming DEI Value.......................................................................................................................... 882
Marking Egress Packets with a DEI Value............................................................................................................ 883
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................883
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................884
Layer 2 Protocol Tunneling........................................................................................................................................... 885
Implementation Information....................................................................................................................................887
Enabling Layer 2 Protocol Tunneling......................................................................................................................887
Specifying a Destination MAC Address for BPDUs.............................................................................................888
Setting Rate-Limit BPDUs......................................................................................................................................888
Debugging Layer 2 Protocol Tunneling..................................................................................................................889
Provider Backbone Bridging.........................................................................................................................................889
49 sFlow.......................................................................................................................................................890
Overview........................................................................................................................................................................ 890
Implementation Information......................................................................................................................................... 890
Important Points to Remember.............................................................................................................................. 891
Enabling Extended sFlow.............................................................................................................................................. 891
Enabling and Disabling sFlow on an Interface............................................................................................................ 892
Enabling sFlow Max-Header Size Extended...............................................................................................................892
sFlow Show Commands............................................................................................................................................... 893
Displaying Show sFlow Global................................................................................................................................893
Contents
27