Administrator Guide

Table Of Contents
Privilege Levels Overview....................................................................................................................................... 843
Configuration Task List for Privilege Levels.......................................................................................................843
RADIUS.............................................................................................................................................................................. 847
RADIUS Authentication and Authorization......................................................................................................... 848
Configuration Task List for RADIUS.....................................................................................................................849
Support for Change of Authorization and Disconnect Messages packets..................................................851
TACACS+...........................................................................................................................................................................861
Configuration Task List for TACACS+..................................................................................................................861
TACACS+ Remote Authentication and Authorization......................................................................................863
Command Authorization..........................................................................................................................................864
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 864
Enabling SCP and SSH.................................................................................................................................................. 864
Using SCP with SSH to Copy a Software Image.............................................................................................. 865
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 866
Configuring When to Re-generate an SSH Key ............................................................................................... 866
Configuring the SSH Server Cipher List..............................................................................................................867
Configuring DNS in the SSH Server..................................................................................................................... 867
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 867
Configuring the HMAC Algorithm for the SSH Client......................................................................................868
Configuring the SSH Server Cipher List..............................................................................................................868
Configuring the SSH Client Cipher List............................................................................................................... 869
Secure Shell Authentication................................................................................................................................... 869
Troubleshooting SSH................................................................................................................................................872
Telnet................................................................................................................................................................................. 872
VTY Line and Access-Class Configuration................................................................................................................872
VTY Line Local Authentication and Authorization.............................................................................................873
VTY Line Remote Authentication and Authorization........................................................................................ 873
VTY MAC-SA Filter Support...................................................................................................................................874
Two Factor Authentication (2FA)...............................................................................................................................874
Handling Access-Challenge Message...................................................................................................................874
Configuring Challenge Response Authentication for SSHv2..........................................................................874
SMS-OTP Mechanism..............................................................................................................................................875
Configuring the System to Drop Certain ICMP Reply Messages........................................................................875
Dell EMC Networking OS Security Hardening......................................................................................................... 877
Startup Configuration Verification........................................................................................................................ 877
Configuring the root User Password....................................................................................................................878
Enabling User Lockout for Failed Login Attempts.............................................................................................878
Chapter 51: Service Provider Bridging....................................................................................... 879
VLAN Stacking.................................................................................................................................................................879
Configure VLAN Stacking........................................................................................................................................ 881
Creating Access and Trunk Ports.......................................................................................................................... 881
Enable VLAN-Stacking for a VLAN.......................................................................................................................882
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................882
Configuring Options for Trunk Ports....................................................................................................................882
Debugging VLAN Stacking......................................................................................................................................883
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 883
VLAN Stacking Packet Drop Precedence.................................................................................................................886
Enabling Drop Eligibility............................................................................................................................................886
Honoring the Incoming DEI Value..........................................................................................................................887
Contents
25