White Papers

Table Of Contents
AAA Authentication........................................................................................................................................................ 740
Configuration Task List for AAA Authentication............................................................................................... 740
Obscuring Passwords and Keys...................................................................................................................................743
AAA Authorization...........................................................................................................................................................743
Privilege Levels Overview....................................................................................................................................... 743
Configuration Task List for Privilege Levels....................................................................................................... 744
RADIUS.............................................................................................................................................................................. 747
RADIUS Authentication............................................................................................................................................748
Configuration Task List for RADIUS..................................................................................................................... 749
TACACS+..........................................................................................................................................................................752
Configuration Task List for TACACS+................................................................................................................. 752
TACACS+ Remote Authentication........................................................................................................................753
Command Authorization..........................................................................................................................................754
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................754
Enabling SCP and SSH.................................................................................................................................................. 755
Using SCP with SSH to Copy a Software Image.............................................................................................. 755
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 756
Configuring When to Re-generate an SSH Key ............................................................................................... 756
Configuring the SSH Server Key Exchange Algorithm.....................................................................................757
Configuring the HMAC Algorithm for the SSH Server.....................................................................................757
Configuring the HMAC Algorithm for the SSH Client......................................................................................758
Configuring the SSH Server Cipher List..............................................................................................................758
Configuring the SSH Client Cipher List............................................................................................................... 759
Secure Shell Authentication................................................................................................................................... 759
Troubleshooting SSH................................................................................................................................................762
Telnet................................................................................................................................................................................. 762
VTY Line and Access-Class Configuration................................................................................................................762
VTY Line Local Authentication and Authorization.............................................................................................762
VTY Line Remote Authentication and Authorization........................................................................................ 763
VTY MAC-SA Filter Support...................................................................................................................................763
Role-Based Access Control.......................................................................................................................................... 764
Overview of RBAC....................................................................................................................................................764
User Roles...................................................................................................................................................................766
AAA Authentication and Authorization for Roles.............................................................................................. 769
Role Accounting.........................................................................................................................................................772
Display Information About User Roles.................................................................................................................. 773
Two Factor Authentication (2FA)...............................................................................................................................774
Handling Access-Challenge Message................................................................................................................... 774
Configuring Challenge Response Authentication for SSHv2.......................................................................... 774
SMS-OTP Mechanism..............................................................................................................................................775
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 775
SSH Lockout Settings.................................................................................................................................................... 777
Chapter 47: Service Provider Bridging....................................................................................... 778
VLAN Stacking.................................................................................................................................................................778
Configure VLAN Stacking........................................................................................................................................779
Creating Access and Trunk Ports......................................................................................................................... 780
Enable VLAN-Stacking for a VLAN.......................................................................................................................780
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................781
Configuring Dell EMC Networking OS Options for Trunk Ports.....................................................................781
22
Contents