Deployment Guide

Table Of Contents
Support for Change of Authorization and Disconnect Messages packets................................................. 769
TACACS+.......................................................................................................................................................................... 779
Configuration Task List for TACACS+................................................................................................................. 779
TACACS+ Remote Authentication........................................................................................................................780
Command Authorization...........................................................................................................................................781
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................782
Enabling SCP and SSH.................................................................................................................................................. 782
Using SCP with SSH to Copy a Software Image...............................................................................................783
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 783
Configuring When to Re-generate an SSH Key ................................................................................................784
Configuring the SSH Server Key Exchange Algorithm.....................................................................................784
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 785
Configuring the SSH Server Cipher List..............................................................................................................785
Configuring DNS in the SSH Server..................................................................................................................... 786
Secure Shell Authentication................................................................................................................................... 786
Troubleshooting SSH................................................................................................................................................788
Telnet................................................................................................................................................................................. 788
VTY Line and Access-Class Configuration................................................................................................................789
VTY Line Local Authentication and Authorization.............................................................................................789
VTY Line Remote Authentication and Authorization........................................................................................790
VTY MAC-SA Filter Support...................................................................................................................................790
Role-Based Access Control.......................................................................................................................................... 790
Overview of RBAC.....................................................................................................................................................791
User Roles................................................................................................................................................................... 793
AAA Authentication and Authorization for Roles.............................................................................................. 796
Role Accounting.........................................................................................................................................................798
Display Information About User Roles..................................................................................................................799
Two Factor Authentication (2FA).............................................................................................................................. 800
Handling Access-Challenge Message................................................................................................................... 801
Configuring Challenge Response Authentication for SSHv2.......................................................................... 801
SMS-OTP Mechanism.............................................................................................................................................. 801
Configuring the System to Drop Certain ICMP Reply Messages........................................................................802
SSH Lockout Settings................................................................................................................................................... 803
Dell EMC Networking OS Security Hardening.........................................................................................................803
Dell EMC Networking OS Image Verification..................................................................................................... 803
Startup Configuration Verification........................................................................................................................804
Configuring the root User Password................................................................................................................... 805
Locking Access to GRUB Interface...................................................................................................................... 806
Enabling User Lockout for Failed Login Attempts............................................................................................ 806
Chapter 48: Service Provider Bridging.......................................................................................807
VLAN Stacking.................................................................................................................................................................807
Configure VLAN Stacking....................................................................................................................................... 808
Creating Access and Trunk Ports......................................................................................................................... 809
Enable VLAN-Stacking for a VLAN...................................................................................................................... 809
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................810
Configuring Dell EMC Networking OS Options for Trunk Ports.................................................................... 810
Debugging VLAN Stacking....................................................................................................................................... 811
VLAN Stacking in Multi-Vendor Networks...........................................................................................................811
VLAN Stacking Packet Drop Precedence..................................................................................................................814
Contents
23