Concept Guide

Table Of Contents
Inuencing RSTP Root Selection.................................................................................................................................708
SNMP Traps for Root Elections and Topology Changes...........................................................................................708
Conguring Fast Hellos for Link State Detection.......................................................................................................708
49 Security....................................................................................................................................................710
Supported Modes...........................................................................................................................................................710
Understanding Banner Settings....................................................................................................................................710
Accessing the I/O Aggregator Using the CMC Console Only...................................................................................711
AAA Accounting.............................................................................................................................................................. 711
Conguration Task List for AAA Accounting..........................................................................................................711
AAA Authentication........................................................................................................................................................713
Conguration Task List for AAA Authentication................................................................................................... 713
AAA Authorization..........................................................................................................................................................716
Privilege Levels Overview........................................................................................................................................717
Conguration Task List for Privilege Levels........................................................................................................... 717
RADIUS............................................................................................................................................................................ 721
RADIUS Authentication and Authorization............................................................................................................721
Conguration Task List for RADIUS.......................................................................................................................723
Support for Change of Authorization and Disconnect Messages packets.......................................................725
TACACS+........................................................................................................................................................................ 737
Conguration Task List for TACACS+....................................................................................................................737
TACACS+ Remote Authentication.........................................................................................................................738
Enabling SCP and SSH..................................................................................................................................................739
Using SCP with SSH to Copy a Software Image.................................................................................................740
Secure Shell Authentication.................................................................................................................................... 741
Conguring the HMAC Algorithm for the SSH Client..........................................................................................741
Conguring the SSH Client Cipher List.................................................................................................................742
Conguring DNS in the SSH Server......................................................................................................................742
Telnet............................................................................................................................................................................... 743
VTY Line and Access-Class Conguration..................................................................................................................743
VTY Line Local Authentication and Authorization................................................................................................743
VTY Line Remote Authentication and Authorization........................................................................................... 744
Role-Based Access Control.......................................................................................................................................... 744
Overview of RBAC...................................................................................................................................................745
User Roles................................................................................................................................................................. 747
AAA Authentication and Authorization for Roles.................................................................................................750
Role Accounting....................................................................................................................................................... 753
Display Information About User Roles...................................................................................................................754
Dell EMC Networking OS Security Hardening...........................................................................................................755
Dell EMC Networking OS Image Verication....................................................................................................... 755
Startup Conguration Verication......................................................................................................................... 756
Conguring the root User Password..................................................................................................................... 757
Enabling User Lockout for Failed Login Attempts................................................................................................758
50 Service Provider Bridging........................................................................................................................ 759
VLAN Stacking...............................................................................................................................................................759
24
Contents