VTY Line and Access-Class Configuration.................................................................................................................. 819VTY Line Local Authentication and Authorization............................................................................................... 820VTY Line Remote Authentication and Authorization...........................................................................................820VTY MAC-SA Filter Support................................................................................................................................... 821Role-Based Access Control...........................................................................................................................................821Overview of RBAC...................................................................................................................................................822User Roles.................................................................................................................................................................824AAA Authentication and Authorization for Roles.................................................................................................827Role Accounting.......................................................................................................................................................830Display Information About User Roles...................................................................................................................830Two Factor Authentication (2FA)................................................................................................................................ 832Handling Access-Challenge Message................................................................................................................... 832Configuring Challenge Response Authentication for SSHv2............................................................................. 832SMS-OTP Mechanism............................................................................................................................................ 833Configuring the System to Drop Certain ICMP Reply Messages............................................................................ 83349 Service Provider Bridging........................................................................................................................ 835VLAN Stacking...............................................................................................................................................................835Important Points to Remember............................................................................................................................. 836Configure VLAN Stacking.......................................................................................................................................836Creating Access and Trunk Ports...........................................................................................................................837Enable VLAN-Stacking for a VLAN....................................................................................................................... 838Configuring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 838Configuring Dell Networking OS Options for Trunk Ports..................................................................................838Debugging VLAN Stacking..................................................................................................................................... 839VLAN Stacking in Multi-Vendor Networks........................................................................................................... 840VLAN Stacking Packet Drop Precedence.................................................................................................................. 844Enabling Drop Eligibility........................................................................................................................................... 844Honoring the Incoming DEI Value.......................................................................................................................... 845Marking Egress Packets with a DEI Value............................................................................................................ 845Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 846Mapping C-Tag to S-Tag dot1p Values...................................................................................................................847Layer 2 Protocol Tunneling........................................................................................................................................... 848Implementation Information....................................................................................................................................849Enabling Layer 2 Protocol Tunneling..................................................................................................................... 850Specifying a Destination MAC Address for BPDUs.............................................................................................850Setting Rate-Limit BPDUs......................................................................................................................................850Debugging Layer 2 Protocol Tunneling.................................................................................................................. 851Provider Backbone Bridging..........................................................................................................................................85150 sFlow.......................................................................................................................................................852Overview.........................................................................................................................................................................852Implementation Information..........................................................................................................................................852Important Points to Remember............................................................................................................................. 853Enabling Extended sFlow..............................................................................................................................................853Enabling and Disabling sFlow on an Interface............................................................................................................ 85426 Contents