Concept Guide

Inuencing RSTP Root Selection..................................................................................................................................716
SNMP Traps for Root Elections and Topology Changes........................................................................................... 716
Conguring Fast Hellos for Link State Detection....................................................................................................... 716
49 Security....................................................................................................................................................718
Supported Modes...........................................................................................................................................................718
Understanding Banner Settings....................................................................................................................................718
Accessing the I/O Aggregator Using the CMC Console Only.................................................................................. 719
AAA Accounting..............................................................................................................................................................719
Conguration Task List for AAA Accounting.........................................................................................................719
RADIUS Accounting................................................................................................................................................. 721
AAA Authentication....................................................................................................................................................... 726
Conguration Task List for AAA Authentication.................................................................................................. 726
AAA Authorization......................................................................................................................................................... 729
Privilege Levels Overview.......................................................................................................................................730
Conguration Task List for Privilege Levels.......................................................................................................... 730
RADIUS........................................................................................................................................................................... 734
RADIUS Authentication and Authorization........................................................................................................... 734
Conguration Task List for RADIUS.......................................................................................................................736
Support for Change of Authorization and Disconnect Messages packets.......................................................738
TACACS+........................................................................................................................................................................750
Conguration Task List for TACACS+...................................................................................................................750
TACACS+ Remote Authentication..........................................................................................................................751
Enabling SCP and SSH..................................................................................................................................................752
Using SCP with SSH to Copy a Software Image.................................................................................................753
Secure Shell Authentication................................................................................................................................... 754
Conguring the HMAC Algorithm for the SSH Client.........................................................................................754
Conguring the SSH Client Cipher List................................................................................................................ 755
Conguring DNS in the SSH Server......................................................................................................................755
Telnet...............................................................................................................................................................................756
VTY Line and Access-Class Conguration................................................................................................................. 756
VTY Line Local Authentication and Authorization............................................................................................... 756
VTY Line Remote Authentication and Authorization........................................................................................... 757
Role-Based Access Control.......................................................................................................................................... 757
Overview of RBAC...................................................................................................................................................758
User Roles.................................................................................................................................................................760
AAA Authentication and Authorization for Roles.................................................................................................763
Role Accounting....................................................................................................................................................... 766
Display Information About User Roles................................................................................................................... 767
Dell EMC Networking OS Security Hardening........................................................................................................... 768
Dell EMC Networking OS Image Verication....................................................................................................... 768
Startup Conguration Verication......................................................................................................................... 769
Conguring the root User Password..................................................................................................................... 770
Enabling User Lockout for Failed Login Attempts.................................................................................................771
50 Service Provider Bridging........................................................................................................................ 772
24
Contents