API Guide

Table Of Contents
Configuration Task List for AAA Authentication............................................................................................... 688
Obscuring Passwords and Keys................................................................................................................................... 691
AAA Authorization........................................................................................................................................................... 691
Privilege Levels Overview........................................................................................................................................691
Configuration Task List for Privilege Levels.......................................................................................................692
RADIUS..............................................................................................................................................................................695
RADIUS Authentication........................................................................................................................................... 696
Configuration Task List for RADIUS..................................................................................................................... 697
RADIUS-assigned dynamic access control lists.................................................................................................699
Support for Change of Authorization and Disconnect Messages packets................................................. 704
TACACS+...........................................................................................................................................................................714
Configuration Task List for TACACS+.................................................................................................................. 714
TACACS+ Remote Authentication.........................................................................................................................716
Command Authorization........................................................................................................................................... 717
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................717
Enabling SCP and SSH................................................................................................................................................... 717
Using SCP with SSH to Copy a Software Image............................................................................................... 718
Removing the RSA Host Keys and Zeroizing Storage ..................................................................................... 719
Configuring When to Re-generate an SSH Key ................................................................................................ 719
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 719
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 720
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 720
Configuring the SSH Server Cipher List...............................................................................................................721
Configuring the SSH Client Cipher List................................................................................................................ 721
Configuring DNS in the SSH Server..................................................................................................................... 722
Secure Shell Authentication....................................................................................................................................722
Troubleshooting SSH................................................................................................................................................724
Telnet................................................................................................................................................................................. 725
VTY Line and Access-Class Configuration................................................................................................................725
VTY Line Local Authentication and Authorization.............................................................................................725
VTY Line Remote Authentication and Authorization........................................................................................ 726
VTY MAC-SA Filter Support...................................................................................................................................726
Role-Based Access Control.......................................................................................................................................... 726
Overview of RBAC.................................................................................................................................................... 727
User Roles................................................................................................................................................................... 729
AAA Authentication and Authorization for Roles...............................................................................................732
Role Accounting.........................................................................................................................................................734
Display Information About User Roles..................................................................................................................735
Two Factor Authentication (2FA)...............................................................................................................................736
Handling Access-Challenge Message................................................................................................................... 737
Configuring Challenge Response Authentication for SSHv2.......................................................................... 737
SMS-OTP Mechanism..............................................................................................................................................737
Configuring the System to Drop Certain ICMP Reply Messages........................................................................738
Dell EMC Networking OS Security Hardening......................................................................................................... 739
Dell EMC Networking OS Image Verification..................................................................................................... 739
Startup Configuration Verification........................................................................................................................740
Configuring the root User Password.....................................................................................................................741
Locking Access to GRUB Interface...................................................................................................................... 742
Enabling User Lockout for Failed Login Attempts.............................................................................................742
Contents
21