Users Guide

Telnet...............................................................................................................................................................................769
VTY Line and Access-Class Conguration................................................................................................................. 769
VTY Line Local Authentication and Authorization................................................................................................770
VTY Line Remote Authentication and Authorization...........................................................................................770
VTY MAC-SA Filter Support................................................................................................................................... 771
Role-Based Access Control...........................................................................................................................................771
Overview of RBAC...................................................................................................................................................772
User Roles................................................................................................................................................................. 774
AAA Authentication and Authorization for Roles................................................................................................. 777
Role Accounting.......................................................................................................................................................780
Display Information About User Roles...................................................................................................................780
Two Factor Authentication (2FA).................................................................................................................................782
Handling Access-Challenge Message....................................................................................................................782
Conguring Challenge Response Authentication for SSHv2............................................................................. 782
SMS-OTP Mechanism............................................................................................................................................ 783
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 783
45 Service Provider Bridging........................................................................................................................ 785
VLAN Stacking...............................................................................................................................................................785
Important Points to Remember..............................................................................................................................786
Congure VLAN Stacking.......................................................................................................................................786
Creating Access and Trunk Ports...........................................................................................................................787
Enable VLAN-Stacking for a VLAN....................................................................................................................... 788
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 788
Conguring Dell Networking OS Options for Trunk Ports.................................................................................. 788
Debugging VLAN Stacking..................................................................................................................................... 789
VLAN Stacking in Multi-Vendor Networks...........................................................................................................790
VLAN Stacking Packet Drop Precedence...................................................................................................................793
Enabling Drop Eligibility........................................................................................................................................... 793
Honoring the Incoming DEI Value.......................................................................................................................... 794
Marking Egress Packets with a DEI Value............................................................................................................ 795
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................795
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................796
Layer 2 Protocol Tunneling............................................................................................................................................797
Implementation Information....................................................................................................................................799
Enabling Layer 2 Protocol Tunneling......................................................................................................................799
Specifying a Destination MAC Address for BPDUs.............................................................................................800
Setting Rate-Limit BPDUs......................................................................................................................................800
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 801
Provider Backbone Bridging..........................................................................................................................................801
46 sFlow.......................................................................................................................................................802
Overview.........................................................................................................................................................................802
Implementation Information..........................................................................................................................................802
Important Points to Remember............................................................................................................................. 803
Enabling Extended sFlow..............................................................................................................................................803
Contents
25