Concept Guide
Conguring the SSH Server Cipher List............................................................................................................... 937
Conguring the SSH Client Cipher List.................................................................................................................937
Secure Shell Authentication................................................................................................................................... 938
Troubleshooting SSH...............................................................................................................................................940
Telnet................................................................................................................................................................................941
VTY Line and Access-Class Conguration..................................................................................................................941
VTY Line Local Authentication and Authorization................................................................................................941
VTY Line Remote Authentication and Authorization...........................................................................................942
VTY MAC-SA Filter Support.................................................................................................................................. 942
Two Factor Authentication (2FA)................................................................................................................................ 943
Handling Access-Challenge Message................................................................................................................... 943
Conguring Challenge Response Authentication for SSHv2............................................................................. 943
SMS-OTP Mechanism............................................................................................................................................944
Conguring the System to Drop Certain ICMP Reply Messages............................................................................944
Dell EMC Networking OS Security Hardening...........................................................................................................946
Startup Conguration Verication.........................................................................................................................946
Conguring the root User Password.....................................................................................................................947
Enabling User Lockout for Failed Login Attempts................................................................................................947
51 Service Provider Bridging.........................................................................................................................948
VLAN Stacking...............................................................................................................................................................948
Important Points to Remember............................................................................................................................. 949
Congure VLAN Stacking...................................................................................................................................... 950
Creating Access and Trunk Ports..........................................................................................................................950
Enable VLAN-Stacking for a VLAN........................................................................................................................951
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................951
Conguring Options for Trunk Ports......................................................................................................................951
Debugging VLAN Stacking.....................................................................................................................................952
VLAN Stacking in Multi-Vendor Networks...........................................................................................................953
VLAN Stacking Packet Drop Precedence.................................................................................................................. 956
Enabling Drop Eligibility........................................................................................................................................... 956
Honoring the Incoming DEI Value.......................................................................................................................... 957
Marking Egress Packets with a DEI Value............................................................................................................ 958
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................958
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................. 959
Layer 2 Protocol Tunneling........................................................................................................................................... 960
Implementation Information....................................................................................................................................962
Enabling Layer 2 Protocol Tunneling......................................................................................................................962
Specifying a Destination MAC Address for BPDUs.............................................................................................963
Setting Rate-Limit BPDUs......................................................................................................................................963
Debugging Layer 2 Protocol Tunneling..................................................................................................................964
Provider Backbone Bridging.........................................................................................................................................964
52 sFlow.......................................................................................................................................................965
Overview........................................................................................................................................................................ 965
Implementation Information......................................................................................................................................... 965
Contents
29