Users Guide
Configuration Task List for TACACS+................................................................................................................. 786
TACACS+ Remote Authentication........................................................................................................................788
Command Authorization..........................................................................................................................................789
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................789
Enabling SCP and SSH.................................................................................................................................................. 789
Using SCP with SSH to Copy a Software Image.............................................................................................. 790
Removing the RSA Host Keys and Zeroizing Storage ..................................................................................... 791
Configuring When to Re-generate an SSH Key ................................................................................................ 791
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 791
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 792
Configuring the HMAC Algorithm for the SSH Client......................................................................................792
Configuring the SSH Server Cipher List..............................................................................................................793
Configuring the SSH Client Cipher List............................................................................................................... 793
Configuring DNS in the SSH Server..................................................................................................................... 794
Secure Shell Authentication................................................................................................................................... 794
Troubleshooting SSH................................................................................................................................................796
Telnet................................................................................................................................................................................. 797
VTY Line and Access-Class Configuration................................................................................................................797
VTY Line Local Authentication and Authorization.............................................................................................797
VTY Line Remote Authentication and Authorization........................................................................................798
VTY MAC-SA Filter Support...................................................................................................................................798
Role-Based Access Control.......................................................................................................................................... 799
Overview of RBAC....................................................................................................................................................799
User Roles....................................................................................................................................................................801
AAA Authentication and Authorization for Roles.............................................................................................. 804
Role Accounting.........................................................................................................................................................807
Display Information About User Roles..................................................................................................................808
Two Factor Authentication (2FA).............................................................................................................................. 809
Handling Access-Challenge Message...................................................................................................................809
Configuring Challenge Response Authentication for SSHv2......................................................................... 809
SMS-OTP Mechanism.............................................................................................................................................. 810
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 810
SSH Lockout Settings..................................................................................................................................................... 811
Dell EMC Networking OS Security Hardening..........................................................................................................812
Dell EMC Networking OS Image Verification......................................................................................................812
Startup Configuration Verification.........................................................................................................................813
Configuring the root User Password.....................................................................................................................814
Locking Access to GRUB Interface.......................................................................................................................814
Enabling User Lockout for Failed Login Attempts............................................................................................. 815
Chapter 48: Service Provider Bridging....................................................................................... 816
VLAN Stacking................................................................................................................................................................. 816
Configure VLAN Stacking........................................................................................................................................ 817
Creating Access and Trunk Ports.......................................................................................................................... 818
Enable VLAN-Stacking for a VLAN....................................................................................................................... 818
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................819
Configuring Dell EMC Networking OS Options for Trunk Ports.................................................................... 819
Debugging VLAN Stacking......................................................................................................................................820
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 820
VLAN Stacking Packet Drop Precedence.................................................................................................................823
Contents
23