White Papers

Table Of Contents
VTY MAC-SA Filter Support...................................................................................................................................763
Two Factor Authentication (2FA)...............................................................................................................................763
Handling Access-Challenge Message...................................................................................................................763
Configuring Challenge Response Authentication for SSHv2..........................................................................764
SMS-OTP Mechanism..............................................................................................................................................764
Configuring the System to Drop Certain ICMP Reply Messages........................................................................764
Dell EMC Networking OS Security Hardening......................................................................................................... 766
Dell EMC Networking OS Image Verification..................................................................................................... 766
Startup Configuration Verification........................................................................................................................ 767
Configuring the root User Password....................................................................................................................768
Enabling User Lockout for Failed Login Attempts.............................................................................................768
Chapter 52: Service Provider Bridging.......................................................................................769
VLAN Stacking.................................................................................................................................................................769
Configure VLAN Stacking............................................................................................................................................. 770
Creating Access and Trunk Ports.......................................................................................................................... 771
Enable VLAN-Stacking for a VLAN........................................................................................................................771
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 772
Dell Networking OS Options for Trunk Ports..................................................................................................... 772
Debugging VLAN Stacking...................................................................................................................................... 773
VLAN Stacking in Multi-Vendor Networks..........................................................................................................773
VLAN Stacking Packet Drop Precedence................................................................................................................. 777
Enabling Drop Eligibility............................................................................................................................................ 777
Honoring the Incoming DEI Value.......................................................................................................................... 777
Marking Egress Packets with a DEI Value...........................................................................................................778
Dynamic Mode CoS for VLAN Stacking.................................................................................................................... 778
Mapping C-Tag to S-Tag dot1p Values................................................................................................................780
Layer 2 Protocol Tunneling...........................................................................................................................................780
Enabling Layer 2 Protocol Tunneling.................................................................................................................... 782
Specifying a Destination MAC Address for BPDUs.......................................................................................... 783
Setting Rate-Limit BPDUs...................................................................................................................................... 783
Debugging Layer 2 Protocol Tunneling................................................................................................................ 783
Provider Backbone Bridging......................................................................................................................................... 783
Chapter 53: sFlow..................................................................................................................... 785
Overview........................................................................................................................................................................... 785
Implementation Information..........................................................................................................................................786
Enabling and Disabling sFlow........................................................................................................................................787
Enabling and Disabling sFlow on an Interface.......................................................................................................... 787
Enabling sFlow Max-Header Size Extended............................................................................................................. 787
sFlow Show Commands................................................................................................................................................ 788
Displaying Show sFlow Global................................................................................................................................ 788
Displaying Show sFlow on an Interface............................................................................................................... 788
Displaying Show sFlow on a Stack-unit............................................................................................................... 789
Configuring Specify Collectors.................................................................................................................................... 789
Changing the Polling Intervals..................................................................................................................................... 789
Back-Off Mechanism..................................................................................................................................................... 790
sFlow on LAG ports........................................................................................................................................................ 790
24
Contents