White Papers

Table Of Contents
Configure RADIUS attributes 8, 87 and 168....................................................................................................... 720
RADIUS-assigned dynamic access control lists.................................................................................................720
Support for Change of Authorization and Disconnect Messages packets................................................. 725
TACACS+..........................................................................................................................................................................735
Configuration Task List for TACACS+................................................................................................................. 735
TACACS+ Remote Authentication........................................................................................................................ 737
Command Authorization.......................................................................................................................................... 738
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................738
Enabling SCP and SSH.................................................................................................................................................. 738
Using SCP with SSH to Copy a Software Image.............................................................................................. 739
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 740
Configuring When to Re-generate an SSH Key ............................................................................................... 740
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 740
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 741
Configuring the SSH Server Cipher List...............................................................................................................741
Configuring DNS in the SSH Server..................................................................................................................... 742
Secure Shell Authentication....................................................................................................................................742
Troubleshooting SSH................................................................................................................................................744
Telnet................................................................................................................................................................................. 745
VTY Line and Access-Class Configuration................................................................................................................745
VTY Line Local Authentication and Authorization.............................................................................................745
VTY Line Remote Authentication and Authorization........................................................................................ 746
VTY MAC-SA Filter Support...................................................................................................................................746
Role-Based Access Control.......................................................................................................................................... 746
Overview of RBAC.................................................................................................................................................... 747
User Roles................................................................................................................................................................... 749
AAA Authentication and Authorization for Roles.............................................................................................. 752
Role Accounting.........................................................................................................................................................754
Display Information About User Roles..................................................................................................................755
Two Factor Authentication (2FA)...............................................................................................................................756
Handling Access-Challenge Message...................................................................................................................757
Configuring Challenge Response Authentication for SSHv2..........................................................................757
SMS-OTP Mechanism..............................................................................................................................................757
Configuring the System to Drop Certain ICMP Reply Messages........................................................................758
Dell EMC Networking OS Security Hardening......................................................................................................... 759
Dell EMC Networking OS Image Verification..................................................................................................... 759
Startup Configuration Verification........................................................................................................................760
Configuring the root User Password.....................................................................................................................761
Enabling User Lockout for Failed Login Attempts.............................................................................................762
Chapter 49: Service Provider Bridging.......................................................................................763
VLAN Stacking.................................................................................................................................................................763
Configure VLAN Stacking....................................................................................................................................... 764
Creating Access and Trunk Ports......................................................................................................................... 765
Enable VLAN-Stacking for a VLAN.......................................................................................................................765
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 766
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................766
Debugging VLAN Stacking...................................................................................................................................... 767
VLAN Stacking in Multi-Vendor Networks..........................................................................................................767
VLAN Stacking Packet Drop Precedence.................................................................................................................. 771
22
Contents