Setup Guide
User Roles.................................................................................................................................................................876
AAA Authentication and Authorization for Roles.................................................................................................879
Role Accounting.......................................................................................................................................................882
Display Information About User Roles...................................................................................................................883
Two Factor Authentication (2FA)................................................................................................................................ 884
Handling Access-Challenge Message................................................................................................................... 884
Conguring Challenge Response Authentication for SSHv2............................................................................. 884
SMS-OTP Mechanism............................................................................................................................................885
Conguring the System to Drop Certain ICMP Reply Messages............................................................................885
SSH Lockout Settings................................................................................................................................................... 887
Dell EMC Networking OS Security Hardening........................................................................................................... 887
Dell EMC Networking OS Image Verication....................................................................................................... 887
Startup Conguration Verication.........................................................................................................................888
Conguring the root User Password.....................................................................................................................889
Locking Access to GRUB Interface.......................................................................................................................890
Enabling User Lockout for Failed Login Attempts............................................................................................... 890
48 Service Provider Bridging........................................................................................................................ 892
VLAN Stacking...............................................................................................................................................................892
Important Points to Remember............................................................................................................................. 893
Congure VLAN Stacking.......................................................................................................................................893
Creating Access and Trunk Ports.......................................................................................................................... 894
Enable VLAN-Stacking for a VLAN.......................................................................................................................895
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................895
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................895
Debugging VLAN Stacking.....................................................................................................................................896
VLAN Stacking in Multi-Vendor Networks...........................................................................................................896
VLAN Stacking Packet Drop Precedence.................................................................................................................. 900
Enabling Drop Eligibility........................................................................................................................................... 900
Honoring the Incoming DEI Value...........................................................................................................................901
Marking Egress Packets with a DEI Value............................................................................................................ 902
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................902
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................903
Layer 2 Protocol Tunneling........................................................................................................................................... 904
Implementation Information................................................................................................................................... 906
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 906
Specifying a Destination MAC Address for BPDUs.............................................................................................907
Setting Rate-Limit BPDUs......................................................................................................................................907
Debugging Layer 2 Protocol Tunneling................................................................................................................. 908
Provider Backbone Bridging.........................................................................................................................................908
49 sFlow.......................................................................................................................................................909
Overview........................................................................................................................................................................ 909
Implementation Information......................................................................................................................................... 909
Important Points to Remember..............................................................................................................................910
Enabling Extended sFlow.............................................................................................................................................. 910
Contents
27










