Install Guide

Table Of Contents
Chapter 45: Security.................................................................................................................. 741
AAA Accounting............................................................................................................................................................... 741
Configuration Task List for AAA Accounting.......................................................................................................741
RADIUS Accounting.................................................................................................................................................. 743
AAA Authentication........................................................................................................................................................ 748
Configuration Task List for AAA Authentication................................................................................................748
Obscuring Passwords and Keys................................................................................................................................... 751
AAA Authorization........................................................................................................................................................... 751
Privilege Levels Overview....................................................................................................................................... 752
Configuration Task List for Privilege Levels....................................................................................................... 752
RADIUS..............................................................................................................................................................................755
RADIUS Authentication............................................................................................................................................756
Configuration Task List for RADIUS..................................................................................................................... 757
Support for Change of Authorization and Disconnect Messages packets................................................. 760
TACACS+.......................................................................................................................................................................... 770
Configuration Task List for TACACS+................................................................................................................. 770
TACACS+ Remote Authentication.........................................................................................................................771
Command Authorization.......................................................................................................................................... 772
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................773
Enabling SCP and SSH...................................................................................................................................................773
Using SCP with SSH to Copy a Software Image...............................................................................................774
Removing the RSA Host Keys and Zeroizing Storage .....................................................................................774
Configuring When to Re-generate an SSH Key ................................................................................................775
Configuring the SSH Server Key Exchange Algorithm.....................................................................................775
Configuring the HMAC Algorithm for the SSH Server.....................................................................................776
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 776
Configuring the SSH Server Cipher List.............................................................................................................. 777
Configuring the SSH Client Cipher List................................................................................................................777
Configuring DNS in the SSH Server..................................................................................................................... 778
Secure Shell Authentication....................................................................................................................................778
Troubleshooting SSH................................................................................................................................................780
Telnet................................................................................................................................................................................. 780
VTY Line and Access-Class Configuration.................................................................................................................781
VTY Line Local Authentication and Authorization..............................................................................................781
VTY Line Remote Authentication and Authorization........................................................................................ 782
VTY MAC-SA Filter Support...................................................................................................................................782
Role-Based Access Control.......................................................................................................................................... 782
Overview of RBAC.................................................................................................................................................... 783
User Roles...................................................................................................................................................................785
AAA Authentication and Authorization for Roles.............................................................................................. 788
Role Accounting........................................................................................................................................................ 790
Display Information About User Roles...................................................................................................................791
Two Factor Authentication (2FA)...............................................................................................................................792
Handling Access-Challenge Message...................................................................................................................793
Configuring Challenge Response Authentication for SSHv2..........................................................................793
SMS-OTP Mechanism..............................................................................................................................................793
Configuring the System to Drop Certain ICMP Reply Messages........................................................................794
SSH Lockout Settings....................................................................................................................................................795
Dell EMC Networking OS Security Hardening......................................................................................................... 795
22
Contents