Users Guide

Telnet...............................................................................................................................................................................729
VTY Line and Access-Class Conguration................................................................................................................. 729
VTY Line Local Authentication and Authorization............................................................................................... 730
VTY Line Remote Authentication and Authorization...........................................................................................730
VTY MAC-SA Filter Support................................................................................................................................... 731
Role-Based Access Control...........................................................................................................................................731
Overview of RBAC...................................................................................................................................................732
User Roles.................................................................................................................................................................734
AAA Authentication and Authorization for Roles................................................................................................. 737
Role Accounting....................................................................................................................................................... 740
Display Information About User Roles................................................................................................................... 740
Two Factor Authentication (2FA).................................................................................................................................742
Handling Access-Challenge Message....................................................................................................................742
Conguring Challenge Response Authentication for SSHv2..............................................................................742
SMS-OTP Mechanism............................................................................................................................................ 743
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 743
47 Service Provider Bridging.........................................................................................................................745
VLAN Stacking............................................................................................................................................................... 745
Important Points to Remember..............................................................................................................................746
Congure VLAN Stacking....................................................................................................................................... 746
Creating Access and Trunk Ports...........................................................................................................................747
Enable VLAN-Stacking for a VLAN....................................................................................................................... 748
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................748
Conguring Dell Networking OS Options for Trunk Ports.................................................................................. 748
Debugging VLAN Stacking..................................................................................................................................... 749
VLAN Stacking in Multi-Vendor Networks...........................................................................................................750
VLAN Stacking Packet Drop Precedence.................................................................................................................. 754
Enabling Drop Eligibility........................................................................................................................................... 754
Honoring the Incoming DEI Value.......................................................................................................................... 755
Marking Egress Packets with a DEI Value............................................................................................................ 755
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................756
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................757
Layer 2 Protocol Tunneling........................................................................................................................................... 758
Implementation Information....................................................................................................................................759
Enabling Layer 2 Protocol Tunneling......................................................................................................................760
Specifying a Destination MAC Address for BPDUs.............................................................................................760
Setting Rate-Limit BPDUs......................................................................................................................................760
Debugging Layer 2 Protocol Tunneling...................................................................................................................761
Provider Backbone Bridging..........................................................................................................................................761
48 sFlow....................................................................................................................................................... 762
Overview.........................................................................................................................................................................762
Implementation Information..........................................................................................................................................762
Important Points to Remember..............................................................................................................................763
Enabling and Disabling sFlow on an Interface............................................................................................................ 763
24
Contents