Concept Guide
AAA Authentication and Authorization for Roles................................................................................................ 850
Role Accounting.......................................................................................................................................................852
Display Information About User Roles...................................................................................................................853
Two Factor Authentication (2FA)................................................................................................................................ 854
Handling Access-Challenge Message...................................................................................................................855
Conguring Challenge Response Authentication for SSHv2.............................................................................855
SMS-OTP Mechanism............................................................................................................................................855
Conguring the System to Drop Certain ICMP Reply Messages............................................................................856
SSH Lockout Settings...................................................................................................................................................857
Dell EMC Networking OS Security Hardening...........................................................................................................858
Dell EMC Networking OS Image Verication.......................................................................................................858
Startup Conguration Verication.........................................................................................................................859
Conguring the root User Password.....................................................................................................................860
Enabling User Lockout for Failed Login Attempts................................................................................................ 861
46 Service Provider Bridging........................................................................................................................ 862
VLAN Stacking...............................................................................................................................................................862
Important Points to Remember............................................................................................................................. 863
Congure VLAN Stacking.......................................................................................................................................863
Creating Access and Trunk Ports.......................................................................................................................... 864
Enable VLAN-Stacking for a VLAN.......................................................................................................................865
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................865
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................865
Debugging VLAN Stacking.....................................................................................................................................866
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 867
VLAN Stacking Packet Drop Precedence...................................................................................................................870
Enabling Drop Eligibility............................................................................................................................................870
Honoring the Incoming DEI Value........................................................................................................................... 871
Marking Egress Packets with a DEI Value............................................................................................................ 872
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 872
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................873
Layer 2 Protocol Tunneling............................................................................................................................................874
Implementation Information....................................................................................................................................876
Enabling Layer 2 Protocol Tunneling......................................................................................................................876
Specifying a Destination MAC Address for BPDUs............................................................................................. 877
Setting Rate-Limit BPDUs...................................................................................................................................... 877
Debugging Layer 2 Protocol Tunneling..................................................................................................................878
Provider Backbone Bridging......................................................................................................................................... 878
47 sFlow....................................................................................................................................................... 879
Overview.........................................................................................................................................................................879
Implementation Information..........................................................................................................................................879
Important Points to Remember............................................................................................................................. 880
Enabling Extended sFlow..............................................................................................................................................880
Enabling and Disabling sFlow on an Interface.............................................................................................................881
Enabling sFlow Max-Header Size Extended............................................................................................................... 881
26
Contents










