Administrator Guide
Telnet................................................................................................................................................................................821
VTY Line and Access-Class Conguration.................................................................................................................. 821
VTY Line Local Authentication and Authorization............................................................................................... 822
VTY Line Remote Authentication and Authorization...........................................................................................822
VTY MAC-SA Filter Support.................................................................................................................................. 823
Role-Based Access Control..........................................................................................................................................823
Overview of RBAC...................................................................................................................................................824
User Roles.................................................................................................................................................................826
AAA Authentication and Authorization for Roles.................................................................................................829
Role Accounting.......................................................................................................................................................832
Display Information About User Roles...................................................................................................................832
Two Factor Authentication (2FA)................................................................................................................................ 834
Handling Access-Challenge Message................................................................................................................... 834
Conguring Challenge Response Authentication for SSHv2............................................................................. 834
SMS-OTP Mechanism............................................................................................................................................835
Conguring the System to Drop Certain ICMP Reply Messages............................................................................835
49 Service Provider Bridging........................................................................................................................ 837
VLAN Stacking............................................................................................................................................................... 837
Important Points to Remember............................................................................................................................. 838
Congure VLAN Stacking.......................................................................................................................................838
Creating Access and Trunk Ports.......................................................................................................................... 839
Enable VLAN-Stacking for a VLAN.......................................................................................................................840
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 840
Conguring Dell Networking OS Options for Trunk Ports..................................................................................840
Debugging VLAN Stacking......................................................................................................................................841
VLAN Stacking in Multi-Vendor Networks...........................................................................................................842
VLAN Stacking Packet Drop Precedence.................................................................................................................. 846
Enabling Drop Eligibility........................................................................................................................................... 846
Honoring the Incoming DEI Value.......................................................................................................................... 847
Marking Egress Packets with a DEI Value............................................................................................................ 847
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................848
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................849
Layer 2 Protocol Tunneling........................................................................................................................................... 850
Implementation Information.................................................................................................................................... 851
Enabling Layer 2 Protocol Tunneling......................................................................................................................852
Specifying a Destination MAC Address for BPDUs.............................................................................................852
Setting Rate-Limit BPDUs......................................................................................................................................852
Debugging Layer 2 Protocol Tunneling..................................................................................................................853
Provider Backbone Bridging.........................................................................................................................................853
50 sFlow.......................................................................................................................................................854
Overview.........................................................................................................................................................................854
Implementation Information..........................................................................................................................................854
Important Points to Remember............................................................................................................................. 855
Enabling Extended sFlow..............................................................................................................................................855
26
Contents