Administrator Guide

Telnet............................................................................................................................................................................... 732
VTY Line and Access-Class Conguration................................................................................................................. 732
VTY Line Local Authentication and Authorization............................................................................................... 733
VTY Line Remote Authentication and Authorization...........................................................................................733
VTY MAC-SA Filter Support...................................................................................................................................734
Role-Based Access Control.......................................................................................................................................... 734
Overview of RBAC...................................................................................................................................................735
User Roles.................................................................................................................................................................737
AAA Authentication and Authorization for Roles.................................................................................................740
Role Accounting....................................................................................................................................................... 743
Display Information About User Roles................................................................................................................... 743
Two Factor Authentication (2FA).................................................................................................................................745
Handling Access-Challenge Message....................................................................................................................745
Conguring Challenge Response Authentication for SSHv2............................................................................. 745
SMS-OTP Mechanism............................................................................................................................................ 746
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 746
47 Service Provider Bridging.........................................................................................................................748
VLAN Stacking............................................................................................................................................................... 748
Important Points to Remember..............................................................................................................................749
Congure VLAN Stacking.......................................................................................................................................749
Creating Access and Trunk Ports.......................................................................................................................... 750
Enable VLAN-Stacking for a VLAN........................................................................................................................751
Conguring the Protocol Type Value for the Outer VLAN Tag........................................................................... 751
Conguring Dell Networking OS Options for Trunk Ports...................................................................................751
Debugging VLAN Stacking..................................................................................................................................... 752
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 753
VLAN Stacking Packet Drop Precedence...................................................................................................................757
Enabling Drop Eligibility............................................................................................................................................757
Honoring the Incoming DEI Value.......................................................................................................................... 758
Marking Egress Packets with a DEI Value............................................................................................................ 758
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................759
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................760
Layer 2 Protocol Tunneling............................................................................................................................................ 761
Implementation Information....................................................................................................................................762
Enabling Layer 2 Protocol Tunneling......................................................................................................................763
Specifying a Destination MAC Address for BPDUs.............................................................................................763
Setting Rate-Limit BPDUs......................................................................................................................................763
Debugging Layer 2 Protocol Tunneling..................................................................................................................764
Provider Backbone Bridging......................................................................................................................................... 764
48 sFlow....................................................................................................................................................... 765
Overview.........................................................................................................................................................................765
Implementation Information..........................................................................................................................................765
Important Points to Remember..............................................................................................................................766
Enabling and Disabling sFlow on an Interface............................................................................................................ 766
24
Contents