Administrator Guide
Configure RADIUS attributes 8, 87 and 168....................................................................................................... 726
RADIUS-assigned dynamic access control lists................................................................................................. 727
Support for Change of Authorization and Disconnect Messages packets.................................................. 731
TACACS+.......................................................................................................................................................................... 742
Configuration Task List for TACACS+................................................................................................................. 742
TACACS+ Remote Authentication........................................................................................................................743
Command Authorization.......................................................................................................................................... 744
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................744
Enabling SCP and SSH.................................................................................................................................................. 745
Using SCP with SSH to Copy a Software Image.............................................................................................. 745
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 746
Configuring When to Re-generate an SSH Key ................................................................................................746
Configuring the SSH Server Key Exchange Algorithm.....................................................................................747
Configuring the HMAC Algorithm for the SSH Server.....................................................................................747
Configuring the SSH Server Cipher List..............................................................................................................748
Configuring DNS in the SSH Server..................................................................................................................... 748
Secure Shell Authentication................................................................................................................................... 749
Troubleshooting SSH................................................................................................................................................ 751
Telnet..................................................................................................................................................................................751
VTY Line and Access-Class Configuration................................................................................................................752
VTY Line Local Authentication and Authorization.............................................................................................752
VTY Line Remote Authentication and Authorization........................................................................................753
VTY MAC-SA Filter Support...................................................................................................................................753
Role-Based Access Control.......................................................................................................................................... 753
Overview of RBAC....................................................................................................................................................754
User Roles...................................................................................................................................................................756
AAA Authentication and Authorization for Roles.............................................................................................. 759
Role Accounting......................................................................................................................................................... 761
Display Information About User Roles..................................................................................................................762
Two Factor Authentication (2FA)...............................................................................................................................763
Handling Access-Challenge Message...................................................................................................................764
Configuring Challenge Response Authentication for SSHv2..........................................................................764
SMS-OTP Mechanism..............................................................................................................................................764
Configuring the System to Drop Certain ICMP Reply Messages........................................................................765
Dell EMC Networking OS Security Hardening......................................................................................................... 766
Dell EMC Networking OS Image Verification..................................................................................................... 766
Startup Configuration Verification........................................................................................................................ 767
Configuring the root User Password....................................................................................................................768
Enabling User Lockout for Failed Login Attempts.............................................................................................769
Chapter 49: Service Provider Bridging.......................................................................................770
VLAN Stacking.................................................................................................................................................................770
Configure VLAN Stacking........................................................................................................................................ 771
Creating Access and Trunk Ports..........................................................................................................................772
Enable VLAN-Stacking for a VLAN....................................................................................................................... 772
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 773
Configuring Dell EMC Networking OS Options for Trunk Ports.................................................................... 773
Debugging VLAN Stacking...................................................................................................................................... 774
VLAN Stacking in Multi-Vendor Networks..........................................................................................................774
VLAN Stacking Packet Drop Precedence................................................................................................................. 778
22
Contents