White Papers
VTY Line and Access-Class Conguration.................................................................................................................. 812
VTY Line Local Authentication and Authorization................................................................................................812
VTY Line Remote Authentication and Authorization........................................................................................... 813
VTY MAC-SA Filter Support................................................................................................................................... 813
Role-Based Access Control...........................................................................................................................................814
Overview of RBAC................................................................................................................................................... 814
User Roles................................................................................................................................................................. 816
AAA Authentication and Authorization for Roles.................................................................................................820
Role Accounting.......................................................................................................................................................822
Display Information About User Roles...................................................................................................................823
Two Factor Authentication (2FA)................................................................................................................................ 824
Handling Access-Challenge Message................................................................................................................... 825
Conguring Challenge Response Authentication for SSHv2............................................................................. 825
SMS-OTP Mechanism............................................................................................................................................825
Conguring the System to Drop Certain ICMP Reply Messages............................................................................826
SSH Lockout Settings................................................................................................................................................... 827
Dell EMC Networking OS Security Hardening........................................................................................................... 828
Dell EMC Networking OS Image Verication....................................................................................................... 828
Startup Conguration Verication.........................................................................................................................829
Conguring the root User Password.....................................................................................................................830
Locking Access to GRUB Interface........................................................................................................................831
Enabling User Lockout for Failed Login Attempts................................................................................................ 831
47 Service Provider Bridging........................................................................................................................ 832
VLAN Stacking...............................................................................................................................................................832
Important Points to Remember............................................................................................................................. 833
Congure VLAN Stacking.......................................................................................................................................833
Creating Access and Trunk Ports.......................................................................................................................... 834
Enable VLAN-Stacking for a VLAN.......................................................................................................................835
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 835
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................835
Debugging VLAN Stacking.....................................................................................................................................836
VLAN Stacking in Multi-Vendor Networks...........................................................................................................836
VLAN Stacking Packet Drop Precedence.................................................................................................................. 840
Enabling Drop Eligibility........................................................................................................................................... 840
Honoring the Incoming DEI Value...........................................................................................................................841
Marking Egress Packets with a DEI Value............................................................................................................ 842
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................842
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................843
Layer 2 Protocol Tunneling........................................................................................................................................... 844
Implementation Information....................................................................................................................................846
Enabling Layer 2 Protocol Tunneling......................................................................................................................846
Specifying a Destination MAC Address for BPDUs.............................................................................................847
Setting Rate-Limit BPDUs......................................................................................................................................847
Debugging Layer 2 Protocol Tunneling..................................................................................................................848
Provider Backbone Bridging.........................................................................................................................................848
26
Contents










