Setup Guide
Overview of RBAC.................................................................................................................................................. 858
User Roles................................................................................................................................................................. 861
AAA Authentication and Authorization for Roles.................................................................................................864
Role Accounting....................................................................................................................................................... 867
Display Information About User Roles...................................................................................................................867
Two Factor Authentication (2FA)................................................................................................................................ 869
Handling Access-Challenge Message................................................................................................................... 869
Conguring Challenge Response Authentication for SSHv2.............................................................................869
SMS-OTP Mechanism............................................................................................................................................ 870
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 870
SSH Lockout Settings....................................................................................................................................................871
Dell EMC Networking OS Security Hardening........................................................................................................... 872
Dell EMC Networking OS Image Verication....................................................................................................... 872
Startup Conguration Verication......................................................................................................................... 873
Conguring the root User Password..................................................................................................................... 874
Enabling User Lockout for Failed Login Attempts................................................................................................875
46 Service Provider Bridging........................................................................................................................ 876
VLAN Stacking............................................................................................................................................................... 876
Important Points to Remember..............................................................................................................................877
Congure VLAN Stacking....................................................................................................................................... 877
Creating Access and Trunk Ports...........................................................................................................................878
Enable VLAN-Stacking for a VLAN....................................................................................................................... 879
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 879
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 879
Debugging VLAN Stacking.....................................................................................................................................880
VLAN Stacking in Multi-Vendor Networks............................................................................................................881
VLAN Stacking Packet Drop Precedence.................................................................................................................. 884
Enabling Drop Eligibility........................................................................................................................................... 884
Honoring the Incoming DEI Value..........................................................................................................................885
Marking Egress Packets with a DEI Value............................................................................................................ 886
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................886
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................887
Layer 2 Protocol Tunneling........................................................................................................................................... 888
Implementation Information................................................................................................................................... 890
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 890
Specifying a Destination MAC Address for BPDUs............................................................................................. 891
Setting Rate-Limit BPDUs.......................................................................................................................................891
Debugging Layer 2 Protocol Tunneling..................................................................................................................892
Provider Backbone Bridging.........................................................................................................................................892
47 sFlow....................................................................................................................................................... 893
Overview.........................................................................................................................................................................893
Implementation Information..........................................................................................................................................893
Important Points to Remember............................................................................................................................. 894
Enabling Extended sFlow..............................................................................................................................................894
26
Contents










