White Papers

Table Of Contents
Important Points to Remember............................................................................................................................. 648
Configuring Interfaces for Layer 2 Mode..................................................................................................................648
Enabling Rapid Spanning Tree Protocol Globally.....................................................................................................648
Adding and Removing Interfaces................................................................................................................................650
Modifying Global Parameters....................................................................................................................................... 651
Enable BPDU Filtering Globally....................................................................................................................................652
Modifying Interface Parameters................................................................................................................................. 652
Configuring an EdgePort...............................................................................................................................................653
Influencing RSTP Root Selection................................................................................................................................ 653
SNMP Traps for Root Elections and Topology Changes...................................................................................... 654
Configuring Fast Hellos for Link State Detection................................................................................................... 654
Chapter 49: Security................................................................................................................. 655
Understanding Banner Settings.................................................................................................................................. 655
Accessing the I/O Aggregator Using the CMC Console Only............................................................................. 656
AAA Accounting.............................................................................................................................................................. 656
Configuration Task List for AAA Accounting..................................................................................................... 656
RADIUS Accounting..................................................................................................................................................658
AAA Authentication........................................................................................................................................................ 663
Configuration Task List for AAA Authentication............................................................................................... 663
AAA Authorization.......................................................................................................................................................... 666
Privilege Levels Overview.......................................................................................................................................666
Configuration Task List for Privilege Levels.......................................................................................................666
RADIUS..............................................................................................................................................................................670
RADIUS Authentication and Authorization......................................................................................................... 670
Configuration Task List for RADIUS......................................................................................................................671
Support for Change of Authorization and Disconnect Messages packets................................................. 673
TACACS+..........................................................................................................................................................................683
Configuration Task List for TACACS+.................................................................................................................683
TACACS+ Remote Authentication........................................................................................................................685
Enabling SCP and SSH.................................................................................................................................................. 686
Using SCP with SSH to Copy a Software Image.............................................................................................. 686
Secure Shell Authentication................................................................................................................................... 687
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 687
Configuring the SSH Client Cipher List............................................................................................................... 688
Configuring DNS in the SSH Server.....................................................................................................................688
Telnet.................................................................................................................................................................................689
VTY Line and Access-Class Configuration............................................................................................................... 689
VTY Line Local Authentication and Authorization............................................................................................ 689
VTY Line Remote Authentication and Authorization........................................................................................690
Role-Based Access Control..........................................................................................................................................690
Overview of RBAC.................................................................................................................................................... 691
User Roles...................................................................................................................................................................693
AAA Authentication and Authorization for Roles.............................................................................................. 696
Role Accounting........................................................................................................................................................ 698
Display Information About User Roles................................................................................................................. 699
Dell EMC Networking OS Security Hardening......................................................................................................... 700
Dell EMC Networking OS Image Verification..................................................................................................... 700
Startup Configuration Verification.........................................................................................................................701
Configuring the root User Password....................................................................................................................702
Contents
21