Users Guide
VTY Line Remote Authentication and Authorization...........................................................................................732
VTY MAC-SA Filter Support.................................................................................................................................. 732
Role-Based Access Control..........................................................................................................................................732
Overview of RBAC.................................................................................................................................................. 733
User Roles.................................................................................................................................................................735
AAA Authentication and Authorization for Roles.................................................................................................739
Role Accounting........................................................................................................................................................741
Display Information About User Roles...................................................................................................................742
Two Factor Authentication (2FA)............................................................................................................................... 743
Handling Access-Challenge Message................................................................................................................... 744
Configuring Challenge Response Authentication for SSHv2............................................................................. 744
SMS-OTP Mechanism............................................................................................................................................ 744
Configuring the System to Drop Certain ICMP Reply Messages............................................................................745
47 Service Provider Bridging.........................................................................................................................747
VLAN Stacking............................................................................................................................................................... 747
Important Points to Remember............................................................................................................................. 748
Configure VLAN Stacking.......................................................................................................................................748
Creating Access and Trunk Ports..........................................................................................................................749
Enable VLAN-Stacking for a VLAN.......................................................................................................................750
Configuring the Protocol Type Value for the Outer VLAN Tag.........................................................................750
Configuring Dell Networking OS Options for Trunk Ports................................................................................. 750
Debugging VLAN Stacking......................................................................................................................................751
VLAN Stacking in Multi-Vendor Networks...........................................................................................................752
VLAN Stacking Packet Drop Precedence..................................................................................................................756
Enabling Drop Eligibility........................................................................................................................................... 756
Honoring the Incoming DEI Value.......................................................................................................................... 757
Marking Egress Packets with a DEI Value............................................................................................................757
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................758
Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 759
Layer 2 Protocol Tunneling...........................................................................................................................................760
Implementation Information.................................................................................................................................... 761
Enabling Layer 2 Protocol Tunneling.....................................................................................................................762
Specifying a Destination MAC Address for BPDUs.............................................................................................762
Setting Rate-Limit BPDUs......................................................................................................................................762
Debugging Layer 2 Protocol Tunneling.................................................................................................................763
Provider Backbone Bridging.........................................................................................................................................763
48 sFlow....................................................................................................................................................... 764
Overview.........................................................................................................................................................................764
Implementation Information......................................................................................................................................... 764
Important Points to Remember............................................................................................................................. 765
Enabling and Disabling sFlow on an Interface............................................................................................................765
Enabling sFlow Max-Header Size Extended.............................................................................................................. 765
sFlow Show Commands............................................................................................................................................... 766
Displaying Show sFlow Global................................................................................................................................ 767
24
Contents