Users Guide

Conguration Task List for AAA Accounting.........................................................................................................710
AAA Authentication........................................................................................................................................................712
Conguration Task List for AAA Authentication................................................................................................... 712
AAA Authorization..........................................................................................................................................................715
Privilege Levels Overview........................................................................................................................................716
Conguration Task List for Privilege Levels...........................................................................................................716
RADIUS........................................................................................................................................................................... 720
RADIUS Authentication and Authorization...........................................................................................................720
Conguration Task List for RADIUS.......................................................................................................................722
Support for Change of Authorization and Disconnect Messages packets.......................................................724
TACACS+........................................................................................................................................................................ 734
Conguration Task List for TACACS+................................................................................................................... 734
TACACS+ Remote Authentication.........................................................................................................................736
Enabling SCP and SSH..................................................................................................................................................737
Using SCP with SSH to Copy a Software Image.................................................................................................737
Secure Shell Authentication....................................................................................................................................738
Conguring the HMAC Algorithm for the SSH Client.........................................................................................738
Conguring the SSH Client Cipher List.................................................................................................................739
Conguring DNS in the SSH Server......................................................................................................................740
Telnet............................................................................................................................................................................... 740
VTY Line and Access-Class Conguration..................................................................................................................740
VTY Line Local Authentication and Authorization................................................................................................ 741
VTY Line Remote Authentication and Authorization............................................................................................741
Role-Based Access Control.......................................................................................................................................... 742
Overview of RBAC...................................................................................................................................................742
User Roles.................................................................................................................................................................744
AAA Authentication and Authorization for Roles.................................................................................................748
Role Accounting.......................................................................................................................................................750
Display Information About User Roles....................................................................................................................751
Dell EMC Networking OS Security Hardening........................................................................................................... 752
Dell EMC Networking OS Image Verication....................................................................................................... 753
Startup Conguration Verication......................................................................................................................... 754
Conguring the root User Password.....................................................................................................................755
Enabling User Lockout for Failed Login Attempts............................................................................................... 755
50 Service Provider Bridging........................................................................................................................ 756
VLAN Stacking...............................................................................................................................................................756
Important Points to Remember..............................................................................................................................757
Congure VLAN Stacking.......................................................................................................................................757
Creating Access and Trunk Ports.......................................................................................................................... 758
Enable VLAN-Stacking for a VLAN.......................................................................................................................758
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 759
Conguring Options for Trunk Ports..................................................................................................................... 759
Debugging VLAN Stacking..................................................................................................................................... 760
VLAN Stacking in Multi-Vendor Networks............................................................................................................761
VLAN Stacking Packet Drop Precedence.................................................................................................................. 765
24
Contents