Concept Guide
User Roles.................................................................................................................................................................874
AAA Authentication and Authorization for Roles................................................................................................. 877
Role Accounting.......................................................................................................................................................880
Display Information About User Roles....................................................................................................................881
Two Factor Authentication (2FA)................................................................................................................................ 882
Handling Access-Challenge Message................................................................................................................... 882
Conguring Challenge Response Authentication for SSHv2............................................................................. 882
SMS-OTP Mechanism............................................................................................................................................883
Conguring the System to Drop Certain ICMP Reply Messages............................................................................883
SSH Lockout Settings...................................................................................................................................................885
Dell EMC Networking OS Security Hardening...........................................................................................................885
Dell EMC Networking OS Image Verication.......................................................................................................885
Startup Conguration Verication.........................................................................................................................886
Conguring the root User Password..................................................................................................................... 887
Locking Access to GRUB Interface.......................................................................................................................888
Enabling User Lockout for Failed Login Attempts............................................................................................... 888
48 Service Provider Bridging........................................................................................................................ 890
VLAN Stacking...............................................................................................................................................................890
Important Points to Remember.............................................................................................................................. 891
Congure VLAN Stacking....................................................................................................................................... 891
Creating Access and Trunk Ports.......................................................................................................................... 892
Enable VLAN-Stacking for a VLAN.......................................................................................................................893
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 893
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................893
Debugging VLAN Stacking.....................................................................................................................................894
VLAN Stacking in Multi-Vendor Networks...........................................................................................................894
VLAN Stacking Packet Drop Precedence.................................................................................................................. 898
Enabling Drop Eligibility........................................................................................................................................... 898
Honoring the Incoming DEI Value..........................................................................................................................899
Marking Egress Packets with a DEI Value............................................................................................................900
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................900
Mapping C-Tag to S-Tag dot1p Values................................................................................................................... 901
Layer 2 Protocol Tunneling........................................................................................................................................... 902
Implementation Information................................................................................................................................... 904
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 904
Specifying a Destination MAC Address for BPDUs............................................................................................ 905
Setting Rate-Limit BPDUs......................................................................................................................................905
Debugging Layer 2 Protocol Tunneling................................................................................................................. 906
Provider Backbone Bridging.........................................................................................................................................906
49 sFlow....................................................................................................................................................... 907
Overview.........................................................................................................................................................................907
Implementation Information..........................................................................................................................................907
Important Points to Remember............................................................................................................................. 908
Enabling Extended sFlow..............................................................................................................................................908
Contents
27










