Users Guide
RADIUS........................................................................................................................................................................... 759
RADIUS Authentication...........................................................................................................................................759
Conguration Task List for RADIUS.......................................................................................................................760
Support for Change of Authorization and Disconnect Messages packets.......................................................764
TACACS+........................................................................................................................................................................775
Conguration Task List for TACACS+................................................................................................................... 775
TACACS+ Remote Authentication......................................................................................................................... 777
Command Authorization......................................................................................................................................... 778
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................778
Enabling SCP and SSH..................................................................................................................................................778
Using SCP with SSH to Copy a Software Image.................................................................................................779
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................780
Conguring When to Re-generate an SSH Key ..................................................................................................780
Conguring the SSH Server Key Exchange Algorithm........................................................................................ 781
Conguring the HMAC Algorithm for the SSH Server........................................................................................781
Conguring the SSH Server Cipher List............................................................................................................... 782
Conguring DNS in the SSH Server......................................................................................................................782
Secure Shell Authentication....................................................................................................................................783
Troubleshooting SSH...............................................................................................................................................785
Telnet...............................................................................................................................................................................785
VTY Line and Access-Class Conguration................................................................................................................. 786
VTY Line Local Authentication and Authorization............................................................................................... 786
VTY Line Remote Authentication and Authorization........................................................................................... 787
VTY MAC-SA Filter Support...................................................................................................................................787
Role-Based Access Control.......................................................................................................................................... 787
Overview of RBAC...................................................................................................................................................788
User Roles.................................................................................................................................................................790
AAA Authentication and Authorization for Roles.................................................................................................793
Role Accounting.......................................................................................................................................................796
Display Information About User Roles................................................................................................................... 797
Two Factor Authentication (2FA)................................................................................................................................ 798
Handling Access-Challenge Message................................................................................................................... 798
Conguring Challenge Response Authentication for SSHv2............................................................................. 798
SMS-OTP Mechanism............................................................................................................................................ 799
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 799
Dell EMC Networking OS Security Hardening............................................................................................................801
Dell EMC Networking OS Image Verication........................................................................................................801
Startup Conguration Verication.........................................................................................................................802
Conguring the root User Password.....................................................................................................................803
Enabling User Lockout for Failed Login Attempts............................................................................................... 804
49 Service Provider Bridging........................................................................................................................ 805
VLAN Stacking...............................................................................................................................................................805
Important Points to Remember............................................................................................................................. 806
Congure VLAN Stacking.......................................................................................................................................806
Creating Access and Trunk Ports...........................................................................................................................807
Contents
25