Concept Guide

Disconnect Message Processing...........................................................................................................................852
Conguring DAC......................................................................................................................................................853
Conguring the port number................................................................................................................................. 853
Conguring shared key........................................................................................................................................... 853
Disconnecting administrative users logged in through RADIUS........................................................................ 853
Conguring CoA to bounce 802.1x enabled ports............................................................................................... 854
Conguring CoA to re-authenticate 802.1x sessions.......................................................................................... 855
Terminating the 802.1x user session......................................................................................................................855
Disabling 802.1x enabled port.................................................................................................................................856
Important points to remember............................................................................................................................... 857
Conguring replay protection................................................................................................................................. 857
Rate-limiting RADIUS packets............................................................................................................................... 858
Conguring time-out value.....................................................................................................................................858
Role-Based Access Control..........................................................................................................................................858
Overview of RBAC.................................................................................................................................................. 859
User Roles................................................................................................................................................................. 861
AAA Authentication and Authorization for Roles.................................................................................................864
Role Accounting....................................................................................................................................................... 867
Display Information About User Roles...................................................................................................................868
Two Factor Authentication (2FA)................................................................................................................................ 869
Handling Access-Challenge Message................................................................................................................... 869
Conguring Challenge Response Authentication for SSHv2.............................................................................869
SMS-OTP Mechanism............................................................................................................................................ 870
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 870
48 Service Provider Bridging.........................................................................................................................872
VLAN Stacking............................................................................................................................................................... 872
Important Points to Remember..............................................................................................................................873
Congure VLAN Stacking.......................................................................................................................................873
Creating Access and Trunk Ports...........................................................................................................................874
Enable VLAN-Stacking for a VLAN....................................................................................................................... 875
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 875
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 875
Debugging VLAN Stacking..................................................................................................................................... 876
VLAN Stacking in Multi-Vendor Networks............................................................................................................877
VLAN Stacking Packet Drop Precedence................................................................................................................... 881
Enabling Drop Eligibility............................................................................................................................................ 881
Honoring the Incoming DEI Value.......................................................................................................................... 882
Marking Egress Packets with a DEI Value............................................................................................................ 882
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................883
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................884
Layer 2 Protocol Tunneling........................................................................................................................................... 885
Implementation Information....................................................................................................................................886
Enabling Layer 2 Protocol Tunneling......................................................................................................................887
Specifying a Destination MAC Address for BPDUs.............................................................................................887
Setting Rate-Limit BPDUs......................................................................................................................................887
26
Contents