Concept Guide

Table Of Contents
VTY Line Remote Authentication and Authorization...........................................................................................822
VTY MAC-SA Filter Support.................................................................................................................................. 823
Support for Change of Authorization and Disconnect Messages packets............................................................ 823
Change of Authorization (CoA) packets...............................................................................................................824
Disconnect Messages............................................................................................................................................. 824
Attributes.................................................................................................................................................................. 824
Error-cause Values...................................................................................................................................................827
CoA Packet Processing...........................................................................................................................................828
CoA or DM Discard..................................................................................................................................................828
Disconnect Message Processing...........................................................................................................................829
Conguring DAC...................................................................................................................................................... 829
Conguring the port number................................................................................................................................. 830
Conguring shared key........................................................................................................................................... 830
Disconnecting administrative users logged in through RADIUS........................................................................ 830
Conguring CoA to bounce 802.1x enabled ports................................................................................................ 831
Conguring CoA to re-authenticate 802.1x sessions........................................................................................... 831
Terminating the 802.1x user session......................................................................................................................832
Disabling 802.1x enabled port................................................................................................................................. 833
Important points to remember............................................................................................................................... 833
Conguring replay protection.................................................................................................................................834
Rate-limiting RADIUS packets................................................................................................................................834
Conguring time-out value.....................................................................................................................................834
Role-Based Access Control..........................................................................................................................................835
Overview of RBAC.................................................................................................................................................. 835
User Roles.................................................................................................................................................................837
AAA Authentication and Authorization for Roles................................................................................................. 841
Role Accounting.......................................................................................................................................................843
Display Information About User Roles...................................................................................................................844
Two Factor Authentication (2FA)................................................................................................................................ 845
Handling Access-Challenge Message................................................................................................................... 846
Conguring Challenge Response Authentication for SSHv2............................................................................. 846
SMS-OTP Mechanism............................................................................................................................................846
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 847
48 Service Provider Bridging........................................................................................................................ 849
VLAN Stacking...............................................................................................................................................................849
Important Points to Remember............................................................................................................................. 850
Congure VLAN Stacking...................................................................................................................................... 850
Creating Access and Trunk Ports........................................................................................................................... 851
Enable VLAN-Stacking for a VLAN.......................................................................................................................852
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 852
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................852
Debugging VLAN Stacking.....................................................................................................................................853
VLAN Stacking in Multi-Vendor Networks...........................................................................................................854
VLAN Stacking Packet Drop Precedence.................................................................................................................. 858
Enabling Drop Eligibility........................................................................................................................................... 858
26
Contents