White Papers

Table Of Contents
Configuration Task List for Privilege Levels....................................................................................................... 742
RADIUS..............................................................................................................................................................................745
RADIUS Authentication............................................................................................................................................746
Configuration Task List for RADIUS..................................................................................................................... 747
Support for Change of Authorization and Disconnect Messages packets................................................. 749
TACACS+..........................................................................................................................................................................759
Configuration Task List for TACACS+................................................................................................................. 759
TACACS+ Remote Authentication.........................................................................................................................761
Command Authorization.......................................................................................................................................... 762
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................762
Enabling SCP and SSH.................................................................................................................................................. 762
Using SCP with SSH to Copy a Software Image.............................................................................................. 763
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 764
Configuring When to Re-generate an SSH Key ............................................................................................... 764
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 764
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 765
Configuring the SSH Server Cipher List..............................................................................................................765
Configuring DNS in the SSH Server..................................................................................................................... 766
Secure Shell Authentication................................................................................................................................... 766
Troubleshooting SSH................................................................................................................................................769
Telnet................................................................................................................................................................................. 769
VTY Line and Access-Class Configuration................................................................................................................769
VTY Line Local Authentication and Authorization.............................................................................................769
VTY Line Remote Authentication and Authorization........................................................................................ 770
VTY MAC-SA Filter Support...................................................................................................................................770
Role-Based Access Control........................................................................................................................................... 771
Overview of RBAC.....................................................................................................................................................771
User Roles................................................................................................................................................................... 773
AAA Authentication and Authorization for Roles...............................................................................................776
Role Accounting.........................................................................................................................................................779
Display Information About User Roles..................................................................................................................780
Two Factor Authentication (2FA)................................................................................................................................781
Handling Access-Challenge Message....................................................................................................................781
Configuring Challenge Response Authentication for SSHv2...........................................................................781
SMS-OTP Mechanism..............................................................................................................................................782
Configuring the System to Drop Certain ICMP Reply Messages........................................................................782
Dell EMC Networking OS Security Hardening......................................................................................................... 784
Dell EMC Networking OS Image Verification..................................................................................................... 784
Startup Configuration Verification........................................................................................................................785
Configuring the root User Password....................................................................................................................786
Locking Access to GRUB Interface...................................................................................................................... 786
Enabling User Lockout for Failed Login Attempts.............................................................................................787
Chapter 46: Service Provider Bridging.......................................................................................788
VLAN Stacking.................................................................................................................................................................788
Configure VLAN Stacking....................................................................................................................................... 789
Creating Access and Trunk Ports......................................................................................................................... 790
Enable VLAN-Stacking for a VLAN.......................................................................................................................790
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................791
Configuring Dell EMC Networking OS Options for Trunk Ports.................................................................... 791
22
Contents