Concept Guide
AAA Authentication and Authorization for Roles.................................................................................................867
Role Accounting....................................................................................................................................................... 870
Display Information About User Roles....................................................................................................................871
Two Factor Authentication (2FA).................................................................................................................................872
Handling Access-Challenge Message....................................................................................................................872
Conguring Challenge Response Authentication for SSHv2..............................................................................872
SMS-OTP Mechanism............................................................................................................................................ 873
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 873
SSH Lockout Settings...................................................................................................................................................875
Dell EMC Networking OS Security Hardening........................................................................................................... 875
Dell EMC Networking OS Image Verication....................................................................................................... 875
Startup Conguration Verication......................................................................................................................... 876
Conguring the root User Password..................................................................................................................... 877
Locking Access to GRUB Interface....................................................................................................................... 878
Enabling User Lockout for Failed Login Attempts................................................................................................878
48 Service Provider Bridging........................................................................................................................ 880
VLAN Stacking...............................................................................................................................................................880
Important Points to Remember.............................................................................................................................. 881
Congure VLAN Stacking....................................................................................................................................... 881
Creating Access and Trunk Ports.......................................................................................................................... 882
Enable VLAN-Stacking for a VLAN.......................................................................................................................883
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 883
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................883
Debugging VLAN Stacking.....................................................................................................................................884
VLAN Stacking in Multi-Vendor Networks...........................................................................................................884
VLAN Stacking Packet Drop Precedence.................................................................................................................. 888
Enabling Drop Eligibility........................................................................................................................................... 888
Honoring the Incoming DEI Value.......................................................................................................................... 889
Marking Egress Packets with a DEI Value............................................................................................................ 890
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................890
Mapping C-Tag to S-Tag dot1p Values................................................................................................................... 891
Layer 2 Protocol Tunneling........................................................................................................................................... 892
Implementation Information....................................................................................................................................894
Enabling Layer 2 Protocol Tunneling......................................................................................................................894
Specifying a Destination MAC Address for BPDUs.............................................................................................895
Setting Rate-Limit BPDUs......................................................................................................................................895
Debugging Layer 2 Protocol Tunneling................................................................................................................. 896
Provider Backbone Bridging.........................................................................................................................................896
49 sFlow....................................................................................................................................................... 897
Overview.........................................................................................................................................................................897
Implementation Information..........................................................................................................................................897
Important Points to Remember............................................................................................................................. 898
Enabling Extended sFlow..............................................................................................................................................898
Enabling and Disabling sFlow on an Interface............................................................................................................899
Contents
27










