White Papers

Table Of Contents
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 783
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 783
Configuring the SSH Server Cipher List..............................................................................................................784
Configuring the SSH Client Cipher List............................................................................................................... 784
Configuring DNS in the SSH Server..................................................................................................................... 785
Secure Shell Authentication................................................................................................................................... 785
Troubleshooting SSH................................................................................................................................................788
Telnet................................................................................................................................................................................. 788
VTY Line and Access-Class Configuration................................................................................................................788
VTY Line Local Authentication and Authorization.............................................................................................788
VTY Line Remote Authentication and Authorization........................................................................................789
VTY MAC-SA Filter Support...................................................................................................................................789
Role-Based Access Control.......................................................................................................................................... 790
Overview of RBAC....................................................................................................................................................790
User Roles................................................................................................................................................................... 792
AAA Authentication and Authorization for Roles.............................................................................................. 795
Role Accounting.........................................................................................................................................................798
Display Information About User Roles..................................................................................................................799
Two Factor Authentication (2FA).............................................................................................................................. 800
Handling Access-Challenge Message.................................................................................................................. 800
Configuring Challenge Response Authentication for SSHv2......................................................................... 800
SMS-OTP Mechanism.............................................................................................................................................. 801
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 801
Dell EMC Networking OS Security Hardening.........................................................................................................803
Dell EMC Networking OS Image Verification..................................................................................................... 803
Startup Configuration Verification........................................................................................................................804
Configuring the root User Password................................................................................................................... 805
Locking Access to GRUB Interface......................................................................................................................805
Enabling User Lockout for Failed Login Attempts............................................................................................ 806
Chapter 48: Service Provider Bridging.......................................................................................807
VLAN Stacking.................................................................................................................................................................807
Configure VLAN Stacking....................................................................................................................................... 808
Creating Access and Trunk Ports......................................................................................................................... 809
Enable VLAN-Stacking for a VLAN...................................................................................................................... 809
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................810
Configuring Dell EMC Networking OS Options for Trunk Ports.................................................................... 810
Debugging VLAN Stacking....................................................................................................................................... 811
VLAN Stacking in Multi-Vendor Networks...........................................................................................................811
VLAN Stacking Packet Drop Precedence..................................................................................................................814
Enabling Drop Eligibility............................................................................................................................................ 814
Honoring the Incoming DEI Value.......................................................................................................................... 815
Marking Egress Packets with a DEI Value........................................................................................................... 815
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................816
Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 817
Layer 2 Protocol Tunneling........................................................................................................................................... 818
Enabling Layer 2 Protocol Tunneling.....................................................................................................................819
Specifying a Destination MAC Address for BPDUs.......................................................................................... 820
Setting Rate-Limit BPDUs...................................................................................................................................... 820
Debugging Layer 2 Protocol Tunneling................................................................................................................820
Contents
23