Concept Guide
Telnet................................................................................................................................................................................871
VTY Line and Access-Class Conguration..................................................................................................................872
VTY Line Local Authentication and Authorization................................................................................................872
VTY Line Remote Authentication and Authorization...........................................................................................873
VTY MAC-SA Filter Support...................................................................................................................................873
Role-Based Access Control.......................................................................................................................................... 873
Overview of RBAC...................................................................................................................................................874
User Roles.................................................................................................................................................................876
AAA Authentication and Authorization for Roles.................................................................................................879
Role Accounting.......................................................................................................................................................882
Display Information About User Roles...................................................................................................................883
Two Factor Authentication (2FA)................................................................................................................................ 884
Handling Access-Challenge Message................................................................................................................... 884
Conguring Challenge Response Authentication for SSHv2............................................................................. 884
SMS-OTP Mechanism............................................................................................................................................885
Conguring the System to Drop Certain ICMP Reply Messages............................................................................885
Dell EMC Networking OS Security Hardening........................................................................................................... 887
Dell EMC Networking OS Image Verication....................................................................................................... 887
Startup Conguration Verication.........................................................................................................................888
Conguring the root User Password.....................................................................................................................889
Locking Access to GRUB Interface.......................................................................................................................890
Enabling User Lockout for Failed Login Attempts................................................................................................ 891
50 Service Provider Bridging........................................................................................................................ 892
VLAN Stacking...............................................................................................................................................................892
Important Points to Remember............................................................................................................................. 893
Congure VLAN Stacking.......................................................................................................................................893
Creating Access and Trunk Ports.......................................................................................................................... 894
Enable VLAN-Stacking for a VLAN.......................................................................................................................895
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................895
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................895
Debugging VLAN Stacking.....................................................................................................................................896
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 897
VLAN Stacking Packet Drop Precedence...................................................................................................................901
Enabling Drop Eligibility............................................................................................................................................901
Honoring the Incoming DEI Value.......................................................................................................................... 902
Marking Egress Packets with a DEI Value............................................................................................................ 902
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................903
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................. 904
Layer 2 Protocol Tunneling........................................................................................................................................... 905
Implementation Information................................................................................................................................... 906
Enabling Layer 2 Protocol Tunneling......................................................................................................................907
Specifying a Destination MAC Address for BPDUs.............................................................................................907
Setting Rate-Limit BPDUs......................................................................................................................................907
Debugging Layer 2 Protocol Tunneling................................................................................................................. 908
Provider Backbone Bridging.........................................................................................................................................908
Contents
27