Install Guide

Table Of Contents
AAA Authentication......................................................................................................................................................... 741
Configuration Task List for AAA Authentication................................................................................................ 741
Obscuring Passwords and Keys...................................................................................................................................744
AAA Authorization...........................................................................................................................................................744
Privilege Levels Overview....................................................................................................................................... 744
Configuration Task List for Privilege Levels....................................................................................................... 745
RADIUS.............................................................................................................................................................................. 748
RADIUS Authentication............................................................................................................................................749
Configuration Task List for RADIUS..................................................................................................................... 750
TACACS+..........................................................................................................................................................................753
Configuration Task List for TACACS+................................................................................................................. 753
TACACS+ Remote Authentication........................................................................................................................754
Command Authorization..........................................................................................................................................755
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 755
Enabling SCP and SSH.................................................................................................................................................. 756
Using SCP with SSH to Copy a Software Image.............................................................................................. 756
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 757
Configuring When to Re-generate an SSH Key ................................................................................................757
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 758
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 758
Configuring the HMAC Algorithm for the SSH Client......................................................................................759
Configuring the SSH Server Cipher List..............................................................................................................759
Configuring the SSH Client Cipher List............................................................................................................... 760
Secure Shell Authentication................................................................................................................................... 760
Troubleshooting SSH................................................................................................................................................763
Telnet................................................................................................................................................................................. 763
VTY Line and Access-Class Configuration................................................................................................................763
VTY Line Local Authentication and Authorization.............................................................................................763
VTY Line Remote Authentication and Authorization........................................................................................ 764
VTY MAC-SA Filter Support...................................................................................................................................764
Role-Based Access Control.......................................................................................................................................... 765
Overview of RBAC....................................................................................................................................................765
User Roles................................................................................................................................................................... 767
AAA Authentication and Authorization for Roles...............................................................................................770
Role Accounting.........................................................................................................................................................773
Display Information About User Roles.................................................................................................................. 774
Two Factor Authentication (2FA)...............................................................................................................................775
Handling Access-Challenge Message...................................................................................................................775
Configuring Challenge Response Authentication for SSHv2..........................................................................775
SMS-OTP Mechanism..............................................................................................................................................776
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 776
SSH Lockout Settings.................................................................................................................................................... 778
Chapter 47: Service Provider Bridging....................................................................................... 779
VLAN Stacking.................................................................................................................................................................779
Configure VLAN Stacking....................................................................................................................................... 780
Creating Access and Trunk Ports.......................................................................................................................... 781
Enable VLAN-Stacking for a VLAN........................................................................................................................781
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 782
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................782
22
Contents