Users Guide

VTY Line and Access-Class Conguration................................................................................................................. 843
VTY Line Local Authentication and Authorization............................................................................................... 844
VTY Line Remote Authentication and Authorization...........................................................................................844
VTY MAC-SA Filter Support.................................................................................................................................. 845
Role-Based Access Control..........................................................................................................................................845
Overview of RBAC.................................................................................................................................................. 846
User Roles.................................................................................................................................................................848
AAA Authentication and Authorization for Roles................................................................................................. 851
Role Accounting.......................................................................................................................................................854
Display Information About User Roles...................................................................................................................855
Two Factor Authentication (2FA)................................................................................................................................856
Handling Access-Challenge Message...................................................................................................................856
Conguring Challenge Response Authentication for SSHv2.............................................................................856
SMS-OTP Mechanism............................................................................................................................................ 857
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 857
SSH Lockout Settings...................................................................................................................................................859
Dell EMC Networking OS Security Hardening...........................................................................................................859
Dell EMC Networking OS Image Verication.......................................................................................................859
Startup Conguration Verication.........................................................................................................................860
Conguring the root User Password......................................................................................................................861
Locking Access to GRUB Interface.......................................................................................................................862
Enabling User Lockout for Failed Login Attempts............................................................................................... 862
48 Service Provider Bridging........................................................................................................................ 864
VLAN Stacking...............................................................................................................................................................864
Important Points to Remember............................................................................................................................. 865
Congure VLAN Stacking.......................................................................................................................................865
Creating Access and Trunk Ports.......................................................................................................................... 866
Enable VLAN-Stacking for a VLAN....................................................................................................................... 867
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 867
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 867
Debugging VLAN Stacking.....................................................................................................................................868
VLAN Stacking in Multi-Vendor Networks...........................................................................................................868
VLAN Stacking Packet Drop Precedence...................................................................................................................872
Enabling Drop Eligibility............................................................................................................................................872
Honoring the Incoming DEI Value.......................................................................................................................... 873
Marking Egress Packets with a DEI Value.............................................................................................................874
Dynamic Mode CoS for VLAN Stacking......................................................................................................................874
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................875
Layer 2 Protocol Tunneling............................................................................................................................................876
Implementation Information....................................................................................................................................878
Enabling Layer 2 Protocol Tunneling......................................................................................................................878
Specifying a Destination MAC Address for BPDUs.............................................................................................879
Setting Rate-Limit BPDUs......................................................................................................................................879
Debugging Layer 2 Protocol Tunneling................................................................................................................. 880
Provider Backbone Bridging.........................................................................................................................................880
Contents
27