EasyManua.ls Logo

Dell S4048-ON - Page 26

Dell S4048-ON
1146 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
VTY Line and Access-Class Conguration..................................................................................................................819
VTY Line Local Authentication and Authorization............................................................................................... 820
VTY Line Remote Authentication and Authorization...........................................................................................820
VTY MAC-SA Filter Support................................................................................................................................... 821
Role-Based Access Control...........................................................................................................................................821
Overview of RBAC...................................................................................................................................................822
User Roles.................................................................................................................................................................824
AAA Authentication and Authorization for Roles.................................................................................................827
Role Accounting.......................................................................................................................................................830
Display Information About User Roles...................................................................................................................830
Two Factor Authentication (2FA)................................................................................................................................ 832
Handling Access-Challenge Message................................................................................................................... 832
Conguring Challenge Response Authentication for SSHv2............................................................................. 832
SMS-OTP Mechanism............................................................................................................................................833
Conguring the System to Drop Certain ICMP Reply Messages............................................................................833
49 Service Provider Bridging........................................................................................................................ 835
VLAN Stacking...............................................................................................................................................................835
Important Points to Remember............................................................................................................................. 836
Congure VLAN Stacking.......................................................................................................................................836
Creating Access and Trunk Ports...........................................................................................................................837
Enable VLAN-Stacking for a VLAN.......................................................................................................................838
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 838
Conguring Dell Networking OS Options for Trunk Ports..................................................................................838
Debugging VLAN Stacking.....................................................................................................................................839
VLAN Stacking in Multi-Vendor Networks...........................................................................................................840
VLAN Stacking Packet Drop Precedence.................................................................................................................. 844
Enabling Drop Eligibility........................................................................................................................................... 844
Honoring the Incoming DEI Value.......................................................................................................................... 845
Marking Egress Packets with a DEI Value............................................................................................................ 845
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................846
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................847
Layer 2 Protocol Tunneling........................................................................................................................................... 848
Implementation Information....................................................................................................................................849
Enabling Layer 2 Protocol Tunneling..................................................................................................................... 850
Specifying a Destination MAC Address for BPDUs.............................................................................................850
Setting Rate-Limit BPDUs......................................................................................................................................850
Debugging Layer 2 Protocol Tunneling.................................................................................................................. 851
Provider Backbone Bridging..........................................................................................................................................851
50 sFlow.......................................................................................................................................................852
Overview.........................................................................................................................................................................852
Implementation Information..........................................................................................................................................852
Important Points to Remember............................................................................................................................. 853
Enabling Extended sFlow..............................................................................................................................................853
Enabling and Disabling sFlow on an Interface............................................................................................................ 854
26
Contents

Table of Contents

Related product manuals