White Papers

Conguring the SSH Client Cipher List................................................................................................................ 829
Troubleshooting SSH...............................................................................................................................................830
Telnet...............................................................................................................................................................................830
VTY Line and Access-Class Conguration................................................................................................................. 830
VTY Line Local Authentication and Authorization............................................................................................... 830
VTY Line Remote Authentication and Authorization........................................................................................... 831
VTY MAC-SA Filter Support.................................................................................................................................. 832
Two Factor Authentication (2FA)................................................................................................................................ 832
Handling Access-Challenge Message................................................................................................................... 832
Conguring Challenge Response Authentication for SSHv2............................................................................. 833
SMS-OTP Mechanism............................................................................................................................................833
Conguring the System to Drop Certain ICMP Reply Messages............................................................................833
Dell EMC Networking OS Security Hardening...........................................................................................................835
Dell EMC Networking OS Image Verication.......................................................................................................835
Startup Conguration Verication.........................................................................................................................836
Conguring the root User Password..................................................................................................................... 837
Enabling User Lockout for Failed Login Attempts............................................................................................... 838
52 Service Provider Bridging........................................................................................................................ 839
VLAN Stacking...............................................................................................................................................................839
Important Points to Remember............................................................................................................................. 840
Congure VLAN Stacking.............................................................................................................................................840
Related Conguration Tasks....................................................................................................................................841
Creating Access and Trunk Ports........................................................................................................................... 841
Enable VLAN-Stacking for a VLAN.......................................................................................................................842
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 842
Dell Networking OS Options for Trunk Ports....................................................................................................... 842
Debugging VLAN Stacking..................................................................................................................................... 843
VLAN Stacking in Multi-Vendor Networks...........................................................................................................844
VLAN Stacking Packet Drop Precedence.................................................................................................................. 848
Enabling Drop Eligibility........................................................................................................................................... 848
Honoring the Incoming DEI Value.......................................................................................................................... 848
Marking Egress Packets with a DEI Value............................................................................................................ 849
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................849
Mapping C-Tag to S-Tag dot1p Values................................................................................................................... 851
Layer 2 Protocol Tunneling............................................................................................................................................ 851
Implementation Information....................................................................................................................................853
Enabling Layer 2 Protocol Tunneling......................................................................................................................853
Specifying a Destination MAC Address for BPDUs.............................................................................................854
Setting Rate-Limit BPDUs......................................................................................................................................854
Debugging Layer 2 Protocol Tunneling................................................................................................................. 855
Provider Backbone Bridging.........................................................................................................................................855
53 sFlow.......................................................................................................................................................856
Overview........................................................................................................................................................................ 856
Implementation Information..........................................................................................................................................857
Contents
27