Administrator Guide

Telnet................................................................................................................................................................................771
VTY Line and Access-Class Conguration.................................................................................................................. 771
VTY Line Local Authentication and Authorization................................................................................................772
VTY Line Remote Authentication and Authorization...........................................................................................772
VTY MAC-SA Filter Support...................................................................................................................................773
Role-Based Access Control.......................................................................................................................................... 773
Overview of RBAC...................................................................................................................................................774
User Roles.................................................................................................................................................................776
AAA Authentication and Authorization for Roles.................................................................................................779
Role Accounting....................................................................................................................................................... 782
Display Information About User Roles................................................................................................................... 782
Two Factor Authentication (2FA)................................................................................................................................ 784
Handling Access-Challenge Message................................................................................................................... 784
Conguring Challenge Response Authentication for SSHv2............................................................................. 784
SMS-OTP Mechanism............................................................................................................................................ 785
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 785
45 Service Provider Bridging.........................................................................................................................787
VLAN Stacking............................................................................................................................................................... 787
Important Points to Remember..............................................................................................................................788
Congure VLAN Stacking.......................................................................................................................................788
Creating Access and Trunk Ports...........................................................................................................................789
Enable VLAN-Stacking for a VLAN.......................................................................................................................790
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 790
Conguring Dell Networking OS Options for Trunk Ports..................................................................................790
Debugging VLAN Stacking......................................................................................................................................791
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 792
VLAN Stacking Packet Drop Precedence.................................................................................................................. 795
Enabling Drop Eligibility........................................................................................................................................... 795
Honoring the Incoming DEI Value.......................................................................................................................... 796
Marking Egress Packets with a DEI Value.............................................................................................................797
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 797
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................798
Layer 2 Protocol Tunneling........................................................................................................................................... 799
Implementation Information.................................................................................................................................... 801
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 801
Specifying a Destination MAC Address for BPDUs.............................................................................................802
Setting Rate-Limit BPDUs......................................................................................................................................802
Debugging Layer 2 Protocol Tunneling..................................................................................................................803
Provider Backbone Bridging.........................................................................................................................................803
46 sFlow.......................................................................................................................................................804
Overview.........................................................................................................................................................................804
Implementation Information......................................................................................................................................... 804
Important Points to Remember............................................................................................................................. 805
Enabling Extended sFlow..............................................................................................................................................805
Contents
25