Concept Guide
User Roles.................................................................................................................................................................870
AAA Authentication and Authorization for Roles.................................................................................................873
Role Accounting....................................................................................................................................................... 876
Display Information About User Roles................................................................................................................... 876
Two Factor Authentication (2FA).................................................................................................................................878
Handling Access-Challenge Message....................................................................................................................878
Conguring Challenge Response Authentication for SSHv2..............................................................................878
SMS-OTP Mechanism............................................................................................................................................ 879
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 879
Dell EMC Networking OS Security Hardening............................................................................................................881
Dell EMC Networking OS Image Verication........................................................................................................881
Startup Conguration Verication.........................................................................................................................882
Conguring the root User Password.....................................................................................................................883
Locking Access to GRUB Interface....................................................................................................................... 884
Enabling User Lockout for Failed Login Attempts............................................................................................... 884
48 Service Provider Bridging........................................................................................................................ 885
VLAN Stacking...............................................................................................................................................................885
Important Points to Remember............................................................................................................................. 886
Congure VLAN Stacking.......................................................................................................................................886
Creating Access and Trunk Ports...........................................................................................................................887
Enable VLAN-Stacking for a VLAN.......................................................................................................................888
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 888
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................888
Debugging VLAN Stacking.....................................................................................................................................889
VLAN Stacking in Multi-Vendor Networks...........................................................................................................890
VLAN Stacking Packet Drop Precedence.................................................................................................................. 893
Enabling Drop Eligibility........................................................................................................................................... 893
Honoring the Incoming DEI Value.......................................................................................................................... 894
Marking Egress Packets with a DEI Value............................................................................................................ 895
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................895
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................896
Layer 2 Protocol Tunneling............................................................................................................................................897
Implementation Information................................................................................................................................... 899
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 899
Specifying a Destination MAC Address for BPDUs............................................................................................ 900
Setting Rate-Limit BPDUs......................................................................................................................................900
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 901
Provider Backbone Bridging..........................................................................................................................................901
49 sFlow.......................................................................................................................................................902
Overview.........................................................................................................................................................................902
Implementation Information..........................................................................................................................................902
Important Points to Remember............................................................................................................................. 903
Enabling Extended sFlow..............................................................................................................................................903
Enabling and Disabling sFlow on an Interface............................................................................................................904
Contents
27










