White Papers

Table Of Contents
AAA Authorization...........................................................................................................................................................735
Privilege Levels Overview....................................................................................................................................... 735
Configuration Task List for Privilege Levels....................................................................................................... 736
RADIUS..............................................................................................................................................................................739
RADIUS Authentication............................................................................................................................................740
Configuration Task List for RADIUS...................................................................................................................... 741
TACACS+.......................................................................................................................................................................... 744
Configuration Task List for TACACS+................................................................................................................. 744
TACACS+ Remote Authentication........................................................................................................................745
Command Authorization.......................................................................................................................................... 746
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................746
Enabling SCP and SSH...................................................................................................................................................747
Using SCP with SSH to Copy a Software Image...............................................................................................747
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 748
Configuring When to Re-generate an SSH Key ................................................................................................748
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 749
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 749
Configuring the HMAC Algorithm for the SSH Client......................................................................................750
Configuring the SSH Server Cipher List..............................................................................................................750
Configuring the SSH Client Cipher List................................................................................................................ 751
Secure Shell Authentication.................................................................................................................................... 751
Troubleshooting SSH................................................................................................................................................754
Telnet................................................................................................................................................................................. 754
VTY Line and Access-Class Configuration................................................................................................................754
VTY Line Local Authentication and Authorization.............................................................................................754
VTY Line Remote Authentication and Authorization........................................................................................755
VTY MAC-SA Filter Support...................................................................................................................................755
Role-Based Access Control.......................................................................................................................................... 756
Overview of RBAC....................................................................................................................................................756
User Roles...................................................................................................................................................................758
AAA Authentication and Authorization for Roles............................................................................................... 761
Role Accounting.........................................................................................................................................................764
Display Information About User Roles..................................................................................................................765
Two Factor Authentication (2FA)...............................................................................................................................766
Handling Access-Challenge Message...................................................................................................................766
Configuring Challenge Response Authentication for SSHv2..........................................................................766
SMS-OTP Mechanism..............................................................................................................................................767
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 767
SSH Lockout Settings....................................................................................................................................................769
Chapter 47: Service Provider Bridging....................................................................................... 770
VLAN Stacking.................................................................................................................................................................770
Configure VLAN Stacking........................................................................................................................................ 771
Creating Access and Trunk Ports..........................................................................................................................772
Enable VLAN-Stacking for a VLAN....................................................................................................................... 772
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 773
Configuring Dell EMC Networking OS Options for Trunk Ports.................................................................... 773
Debugging VLAN Stacking...................................................................................................................................... 774
VLAN Stacking in Multi-Vendor Networks..........................................................................................................774
VLAN Stacking Packet Drop Precedence................................................................................................................. 777
22
Contents