Setup Guide
Telnet............................................................................................................................................................................... 762
VTY Line and Access-Class Conguration................................................................................................................. 762
VTY Line Local Authentication and Authorization............................................................................................... 762
VTY Line Remote Authentication and Authorization...........................................................................................763
VTY MAC-SA Filter Support...................................................................................................................................763
Role-Based Access Control.......................................................................................................................................... 764
Overview of RBAC...................................................................................................................................................764
User Roles.................................................................................................................................................................766
AAA Authentication and Authorization for Roles.................................................................................................770
Role Accounting....................................................................................................................................................... 772
Display Information About User Roles................................................................................................................... 773
Two Factor Authentication (2FA).................................................................................................................................774
Handling Access-Challenge Message....................................................................................................................775
Conguring Challenge Response Authentication for SSHv2............................................................................. 775
SMS-OTP Mechanism............................................................................................................................................ 775
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 776
Dell EMC Networking OS Security Hardening........................................................................................................... 777
Dell EMC Networking OS Image Verication........................................................................................................777
Startup Conguration Verication......................................................................................................................... 779
Conguring the root User Password..................................................................................................................... 780
Locking Access to GRUB Interface....................................................................................................................... 780
Enabling User Lockout for Failed Login Attempts.................................................................................................781
46 Service Provider Bridging........................................................................................................................ 782
VLAN Stacking............................................................................................................................................................... 782
Important Points to Remember..............................................................................................................................783
Congure VLAN Stacking.......................................................................................................................................783
Creating Access and Trunk Ports...........................................................................................................................784
Enable VLAN-Stacking for a VLAN....................................................................................................................... 784
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 785
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 785
Debugging VLAN Stacking..................................................................................................................................... 785
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 786
VLAN Stacking Packet Drop Precedence...................................................................................................................789
Enabling Drop Eligibility........................................................................................................................................... 789
Honoring the Incoming DEI Value.......................................................................................................................... 790
Marking Egress Packets with a DEI Value............................................................................................................ 790
Dynamic Mode CoS for VLAN Stacking......................................................................................................................791
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................792
Layer 2 Protocol Tunneling............................................................................................................................................792
Implementation Information....................................................................................................................................794
Enabling Layer 2 Protocol Tunneling......................................................................................................................794
Specifying a Destination MAC Address for BPDUs.............................................................................................795
Setting Rate-Limit BPDUs......................................................................................................................................795
Debugging Layer 2 Protocol Tunneling..................................................................................................................796
Provider Backbone Bridging......................................................................................................................................... 796
26
Contents










