Deployment Guide

Table Of Contents
Privilege Levels Overview....................................................................................................................................... 743
Configuration Task List for Privilege Levels....................................................................................................... 744
RADIUS.............................................................................................................................................................................. 747
RADIUS Authentication............................................................................................................................................748
Configuration Task List for RADIUS..................................................................................................................... 749
Support for Change of Authorization and Disconnect Messages packets.................................................. 751
TACACS+...........................................................................................................................................................................761
Configuration Task List for TACACS+..................................................................................................................761
TACACS+ Remote Authentication........................................................................................................................763
Command Authorization.......................................................................................................................................... 764
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................764
Enabling SCP and SSH.................................................................................................................................................. 764
Using SCP with SSH to Copy a Software Image.............................................................................................. 765
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 766
Configuring When to Re-generate an SSH Key ............................................................................................... 766
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 766
Configuring the HMAC Algorithm for the SSH Server.....................................................................................767
Configuring the SSH Server Cipher List..............................................................................................................767
Configuring DNS in the SSH Server..................................................................................................................... 768
Secure Shell Authentication................................................................................................................................... 768
Troubleshooting SSH.................................................................................................................................................771
Telnet.................................................................................................................................................................................. 771
VTY Line and Access-Class Configuration.................................................................................................................771
VTY Line Local Authentication and Authorization..............................................................................................771
VTY Line Remote Authentication and Authorization........................................................................................ 772
VTY MAC-SA Filter Support................................................................................................................................... 772
Role-Based Access Control.......................................................................................................................................... 773
Overview of RBAC.................................................................................................................................................... 773
User Roles................................................................................................................................................................... 775
AAA Authentication and Authorization for Roles...............................................................................................778
Role Accounting......................................................................................................................................................... 781
Display Information About User Roles..................................................................................................................782
Two Factor Authentication (2FA)...............................................................................................................................783
Handling Access-Challenge Message...................................................................................................................783
Configuring Challenge Response Authentication for SSHv2..........................................................................783
SMS-OTP Mechanism..............................................................................................................................................784
Configuring the System to Drop Certain ICMP Reply Messages........................................................................784
Dell EMC Networking OS Security Hardening......................................................................................................... 786
Dell EMC Networking OS Image Verification..................................................................................................... 786
Startup Configuration Verification........................................................................................................................ 787
Configuring the root User Password....................................................................................................................788
Locking Access to GRUB Interface...................................................................................................................... 788
Enabling User Lockout for Failed Login Attempts.............................................................................................789
Chapter 46: Service Provider Bridging.......................................................................................790
VLAN Stacking.................................................................................................................................................................790
Configure VLAN Stacking........................................................................................................................................ 791
Creating Access and Trunk Ports......................................................................................................................... 792
Enable VLAN-Stacking for a VLAN.......................................................................................................................792
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 793
22
Contents