Concept Guide

TACACS+........................................................................................................................................................................808
Conguration Task List for TACACS+...................................................................................................................808
TACACS+ Remote Authentication......................................................................................................................... 810
Command Authorization...........................................................................................................................................811
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................811
Enabling SCP and SSH...................................................................................................................................................811
Using SCP with SSH to Copy a Software Image................................................................................................. 812
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 813
Conguring When to Re-generate an SSH Key .................................................................................................. 813
Conguring the SSH Server Key Exchange Algorithm........................................................................................814
Conguring the HMAC Algorithm for the SSH Server........................................................................................814
Conguring the SSH Server Cipher List................................................................................................................815
Conguring DNS in the SSH Server...................................................................................................................... 815
Secure Shell Authentication....................................................................................................................................816
Troubleshooting SSH................................................................................................................................................818
Telnet................................................................................................................................................................................819
VTY Line and Access-Class Conguration..................................................................................................................819
VTY Line Local Authentication and Authorization................................................................................................819
VTY Line Remote Authentication and Authorization...........................................................................................820
VTY MAC-SA Filter Support.................................................................................................................................. 820
Role-Based Access Control...........................................................................................................................................821
Overview of RBAC................................................................................................................................................... 821
User Roles.................................................................................................................................................................823
AAA Authentication and Authorization for Roles.................................................................................................827
Role Accounting.......................................................................................................................................................829
Display Information About User Roles...................................................................................................................830
Two Factor Authentication (2FA).................................................................................................................................831
Handling Access-Challenge Message................................................................................................................... 832
Conguring Challenge Response Authentication for SSHv2............................................................................. 832
SMS-OTP Mechanism............................................................................................................................................832
Conguring the System to Drop Certain ICMP Reply Messages............................................................................833
Dell EMC Networking OS Security Hardening...........................................................................................................834
Dell EMC Networking OS Image Verication.......................................................................................................834
Startup Conguration Verication.........................................................................................................................836
Conguring the root User Password..................................................................................................................... 837
Enabling User Lockout for Failed Login Attempts................................................................................................837
49 Service Provider Bridging........................................................................................................................ 838
VLAN Stacking...............................................................................................................................................................838
Important Points to Remember............................................................................................................................. 839
Congure VLAN Stacking.......................................................................................................................................839
Creating Access and Trunk Ports.......................................................................................................................... 840
Enable VLAN-Stacking for a VLAN........................................................................................................................841
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................841
Conguring Dell EMC Networking OS Options for Trunk Ports.........................................................................841
Debugging VLAN Stacking..................................................................................................................................... 842
Contents
25