White Papers

Table Of Contents
User Roles...................................................................................................................................................................696
AAA Authentication and Authorization for Roles.............................................................................................. 699
Role Accounting......................................................................................................................................................... 701
Display Information About User Roles..................................................................................................................702
AAA Accounting...............................................................................................................................................................703
Configuration Task List for AAA Accounting......................................................................................................703
AAA Authentication........................................................................................................................................................ 705
Configuration Task List for AAA Authentication............................................................................................... 705
Obscuring Passwords and Keys.................................................................................................................................. 708
AAA Authorization...........................................................................................................................................................708
Privilege Levels Overview....................................................................................................................................... 708
Configuration Task List for Privilege Levels.......................................................................................................709
RADIUS...............................................................................................................................................................................713
RADIUS Authentication............................................................................................................................................ 713
Configuration Task List for RADIUS...................................................................................................................... 714
Support for Change of Authorization and Disconnect Messages packets.................................................. 717
TACACS+..........................................................................................................................................................................726
Configuration Task List for TACACS+................................................................................................................. 726
TACACS+ Remote Authentication........................................................................................................................ 727
Command Authorization.......................................................................................................................................... 728
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................729
Enabling SCP and SSH.................................................................................................................................................. 729
Using SCP with SSH to Copy a Software Image.............................................................................................. 730
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 730
Configuring When to Re-generate an SSH Key ................................................................................................ 731
Configuring the SSH Server Cipher List...............................................................................................................731
Configuring the HMAC Algorithm for the SSH Server.....................................................................................732
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 732
Configuring the SSH Server Cipher List..............................................................................................................733
Configuring the SSH Client Cipher List............................................................................................................... 733
Secure Shell Authentication....................................................................................................................................734
Troubleshooting SSH................................................................................................................................................736
Telnet................................................................................................................................................................................. 736
VTY Line and Access-Class Configuration................................................................................................................736
VTY Line Local Authentication and Authorization............................................................................................. 737
VTY Line Remote Authentication and Authorization........................................................................................ 737
VTY MAC-SA Filter Support...................................................................................................................................738
Two Factor Authentication (2FA)...............................................................................................................................738
Handling Access-Challenge Message...................................................................................................................738
Configuring Challenge Response Authentication for SSHv2..........................................................................739
SMS-OTP Mechanism..............................................................................................................................................739
Configuring the System to Drop Certain ICMP Reply Messages........................................................................739
Dell EMC Networking OS Security Hardening.......................................................................................................... 741
Startup Configuration Verification.........................................................................................................................741
Configuring the root User Password....................................................................................................................742
Enabling User Lockout for Failed Login Attempts.............................................................................................742
Chapter 48: Service Provider Bridging.......................................................................................743
VLAN Stacking.................................................................................................................................................................743
Configure VLAN Stacking....................................................................................................................................... 744
22
Contents