Users Guide
VTY Line Remote Authentication and Authorization...........................................................................................767
VTY MAC-SA Filter Support...................................................................................................................................767
Role-Based Access Control..........................................................................................................................................767
Overview of RBAC.................................................................................................................................................. 768
User Roles.................................................................................................................................................................770
AAA Authentication and Authorization for Roles.................................................................................................774
Role Accounting.......................................................................................................................................................776
Display Information About User Roles................................................................................................................... 777
Two Factor Authentication (2FA)............................................................................................................................... 778
Handling Access-Challenge Message....................................................................................................................779
Configuring Challenge Response Authentication for SSHv2............................................................................. 779
SMS-OTP Mechanism............................................................................................................................................ 779
Configuring the System to Drop Certain ICMP Reply Messages............................................................................780
45 Service Provider Bridging........................................................................................................................ 782
VLAN Stacking...............................................................................................................................................................782
Important Points to Remember............................................................................................................................. 783
Configure VLAN Stacking.......................................................................................................................................783
Creating Access and Trunk Ports..........................................................................................................................784
Enable VLAN-Stacking for a VLAN.......................................................................................................................785
Configuring the Protocol Type Value for the Outer VLAN Tag.........................................................................785
Configuring Dell Networking OS Options for Trunk Ports................................................................................. 785
Debugging VLAN Stacking..................................................................................................................................... 786
VLAN Stacking in Multi-Vendor Networks...........................................................................................................787
VLAN Stacking Packet Drop Precedence..................................................................................................................790
Enabling Drop Eligibility........................................................................................................................................... 790
Honoring the Incoming DEI Value...........................................................................................................................791
Marking Egress Packets with a DEI Value............................................................................................................792
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 792
Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 793
Layer 2 Protocol Tunneling...........................................................................................................................................794
Implementation Information................................................................................................................................... 796
Enabling Layer 2 Protocol Tunneling.....................................................................................................................796
Specifying a Destination MAC Address for BPDUs.............................................................................................797
Setting Rate-Limit BPDUs......................................................................................................................................797
Debugging Layer 2 Protocol Tunneling.................................................................................................................798
Provider Backbone Bridging.........................................................................................................................................798
46 sFlow....................................................................................................................................................... 799
Overview.........................................................................................................................................................................799
Implementation Information......................................................................................................................................... 799
Important Points to Remember.............................................................................................................................800
Enabling Extended sFlow............................................................................................................................................. 800
Enabling and Disabling sFlow on an Interface.............................................................................................................801
Enabling sFlow Max-Header Size Extended...............................................................................................................801
sFlow Show Commands............................................................................................................................................... 802
Contents
25










