Connectivity Guide

Table Of Contents
TACACS+...........................................................................................................................................................................791
Configuration Task List for TACACS+..................................................................................................................791
TACACS+ Remote Authentication........................................................................................................................793
Command Authorization.......................................................................................................................................... 794
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................794
Enabling SCP and SSH.................................................................................................................................................. 794
Using SCP with SSH to Copy a Software Image.............................................................................................. 795
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 796
Configuring When to Re-generate an SSH Key ............................................................................................... 796
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 796
Configuring the HMAC Algorithm for the SSH Server.....................................................................................797
Configuring the SSH Server Cipher List..............................................................................................................797
Configuring DNS in the SSH Server..................................................................................................................... 798
Secure Shell Authentication................................................................................................................................... 798
Troubleshooting SSH................................................................................................................................................ 801
Telnet..................................................................................................................................................................................801
VTY Line and Access-Class Configuration................................................................................................................ 801
VTY Line Local Authentication and Authorization............................................................................................. 801
VTY Line Remote Authentication and Authorization........................................................................................802
VTY MAC-SA Filter Support...................................................................................................................................802
Role-Based Access Control..........................................................................................................................................803
Overview of RBAC....................................................................................................................................................803
User Roles...................................................................................................................................................................805
AAA Authentication and Authorization for Roles.............................................................................................. 808
Role Accounting.......................................................................................................................................................... 811
Display Information About User Roles.................................................................................................................. 812
Two Factor Authentication (2FA)............................................................................................................................... 813
Handling Access-Challenge Message................................................................................................................... 813
Configuring Challenge Response Authentication for SSHv2.......................................................................... 813
SMS-OTP Mechanism.............................................................................................................................................. 814
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 814
Dell EMC Networking OS Security Hardening..........................................................................................................816
Dell EMC Networking OS Image Verification......................................................................................................816
Startup Configuration Verification.........................................................................................................................817
Configuring the root User Password.................................................................................................................... 818
Locking Access to GRUB Interface.......................................................................................................................818
Enabling User Lockout for Failed Login Attempts............................................................................................. 819
Chapter 50: Service Provider Bridging...................................................................................... 820
VLAN Stacking................................................................................................................................................................ 820
Configure VLAN Stacking........................................................................................................................................ 821
Creating Access and Trunk Ports......................................................................................................................... 822
Enable VLAN-Stacking for a VLAN.......................................................................................................................822
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................823
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................823
Debugging VLAN Stacking......................................................................................................................................824
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 824
VLAN Stacking Packet Drop Precedence.................................................................................................................828
Enabling Drop Eligibility............................................................................................................................................828
Honoring the Incoming DEI Value..........................................................................................................................828
Contents
23