White Papers

Table Of Contents
Configuring Challenge Response Authentication for SSHv2..........................................................................839
SMS-OTP Mechanism............................................................................................................................................. 840
Configuring the System to Drop Certain ICMP Reply Messages........................................................................840
Dell EMC Networking OS Security Hardening......................................................................................................... 842
Dell EMC Networking OS Image Verification..................................................................................................... 842
Startup Configuration Verification........................................................................................................................843
Configuring the root User Password....................................................................................................................844
Locking Access to GRUB Interface...................................................................................................................... 844
Enabling User Lockout for Failed Login Attempts............................................................................................ 845
Chapter 51: Service Provider Bridging....................................................................................... 846
VLAN Stacking.................................................................................................................................................................846
Configure VLAN Stacking....................................................................................................................................... 847
Creating Access and Trunk Ports......................................................................................................................... 848
Enable VLAN-Stacking for a VLAN.......................................................................................................................848
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................849
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................849
Debugging VLAN Stacking......................................................................................................................................850
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 850
VLAN Stacking Packet Drop Precedence.................................................................................................................854
Enabling Drop Eligibility............................................................................................................................................854
Honoring the Incoming DEI Value......................................................................................................................... 854
Marking Egress Packets with a DEI Value.......................................................................................................... 855
Dynamic Mode CoS for VLAN Stacking....................................................................................................................855
Mapping C-Tag to S-Tag dot1p Values................................................................................................................857
Layer 2 Protocol Tunneling...........................................................................................................................................857
Enabling Layer 2 Protocol Tunneling....................................................................................................................859
Specifying a Destination MAC Address for BPDUs..........................................................................................860
Setting Rate-Limit BPDUs......................................................................................................................................860
Debugging Layer 2 Protocol Tunneling................................................................................................................860
Provider Backbone Bridging.........................................................................................................................................860
Chapter 52: sFlow..................................................................................................................... 862
Overview...........................................................................................................................................................................862
Implementation Information......................................................................................................................................... 862
Enabling Extended sFlow.............................................................................................................................................. 863
Enabling and Disabling sFlow on an Interface..........................................................................................................864
Enabling sFlow Max-Header Size Extended.............................................................................................................864
sFlow Show Commands................................................................................................................................................ 865
Displaying Show sFlow Global................................................................................................................................865
Displaying Show sFlow on an Interface............................................................................................................... 866
Displaying Show sFlow on a Stack-unit...............................................................................................................866
Configuring Specify Collectors....................................................................................................................................866
Changing the Polling Intervals..................................................................................................................................... 867
Back-Off Mechanism..................................................................................................................................................... 867
sFlow on LAG ports........................................................................................................................................................ 867
Enabling Extended sFlow.............................................................................................................................................. 867
Important Points to Remember............................................................................................................................. 868
24
Contents