Setup Guide

User Roles..................................................................................................................................................................871
AAA Authentication and Authorization for Roles................................................................................................. 874
Role Accounting....................................................................................................................................................... 877
Display Information About User Roles................................................................................................................... 877
Two Factor Authentication (2FA)................................................................................................................................ 879
Handling Access-Challenge Message................................................................................................................... 879
Conguring Challenge Response Authentication for SSHv2............................................................................. 879
SMS-OTP Mechanism............................................................................................................................................880
Conguring the System to Drop Certain ICMP Reply Messages............................................................................880
Dell EMC Networking OS Security Hardening...........................................................................................................882
Dell EMC Networking OS Image Verication.......................................................................................................882
Startup Conguration Verication.........................................................................................................................883
Conguring the root User Password.....................................................................................................................884
Locking Access to GRUB Interface.......................................................................................................................885
Enabling User Lockout for Failed Login Attempts............................................................................................... 885
48 Service Provider Bridging........................................................................................................................ 886
VLAN Stacking...............................................................................................................................................................886
Important Points to Remember..............................................................................................................................887
Congure VLAN Stacking.......................................................................................................................................887
Creating Access and Trunk Ports.......................................................................................................................... 888
Enable VLAN-Stacking for a VLAN.......................................................................................................................889
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 889
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................889
Debugging VLAN Stacking.....................................................................................................................................890
VLAN Stacking in Multi-Vendor Networks............................................................................................................891
VLAN Stacking Packet Drop Precedence.................................................................................................................. 894
Enabling Drop Eligibility........................................................................................................................................... 894
Honoring the Incoming DEI Value..........................................................................................................................895
Marking Egress Packets with a DEI Value............................................................................................................ 896
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................896
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................897
Layer 2 Protocol Tunneling........................................................................................................................................... 898
Implementation Information................................................................................................................................... 900
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 900
Specifying a Destination MAC Address for BPDUs............................................................................................. 901
Setting Rate-Limit BPDUs...................................................................................................................................... 901
Debugging Layer 2 Protocol Tunneling..................................................................................................................902
Provider Backbone Bridging.........................................................................................................................................902
49 sFlow.......................................................................................................................................................903
Overview.........................................................................................................................................................................903
Implementation Information..........................................................................................................................................903
Important Points to Remember............................................................................................................................. 904
Enabling Extended sFlow..............................................................................................................................................904
Enabling and Disabling sFlow on an Interface............................................................................................................905
Contents
27