Connectivity Guide

Table Of Contents
Chapter 45: Security................................................................................................................. 734
AAA Accounting...............................................................................................................................................................734
Configuration Task List for AAA Accounting......................................................................................................734
AAA Authentication........................................................................................................................................................ 736
Configuration Task List for AAA Authentication................................................................................................736
Obscuring Passwords and Keys...................................................................................................................................739
AAA Authorization...........................................................................................................................................................739
Privilege Levels Overview....................................................................................................................................... 740
Configuration Task List for Privilege Levels....................................................................................................... 740
RADIUS.............................................................................................................................................................................. 743
RADIUS Authentication............................................................................................................................................744
Configuration Task List for RADIUS..................................................................................................................... 745
Support for Change of Authorization and Disconnect Messages packets................................................. 748
TACACS+..........................................................................................................................................................................758
Configuration Task List for TACACS+................................................................................................................. 758
TACACS+ Remote Authentication........................................................................................................................759
Command Authorization..........................................................................................................................................760
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 761
Enabling SCP and SSH................................................................................................................................................... 761
Using SCP with SSH to Copy a Software Image.............................................................................................. 762
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 762
Configuring When to Re-generate an SSH Key ............................................................................................... 763
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 763
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 764
Configuring the HMAC Algorithm for the SSH Client......................................................................................764
Configuring the SSH Server Cipher List..............................................................................................................765
Configuring the SSH Client Cipher List............................................................................................................... 765
Configuring DNS in the SSH Server..................................................................................................................... 766
Secure Shell Authentication................................................................................................................................... 766
Troubleshooting SSH................................................................................................................................................768
Telnet................................................................................................................................................................................. 768
VTY Line and Access-Class Configuration................................................................................................................769
VTY Line Local Authentication and Authorization.............................................................................................769
VTY Line Remote Authentication and Authorization........................................................................................ 770
VTY MAC-SA Filter Support...................................................................................................................................770
Role-Based Access Control.......................................................................................................................................... 770
Overview of RBAC.....................................................................................................................................................771
User Roles................................................................................................................................................................... 773
AAA Authentication and Authorization for Roles...............................................................................................776
Role Accounting.........................................................................................................................................................778
Display Information About User Roles..................................................................................................................779
Two Factor Authentication (2FA)...............................................................................................................................780
Handling Access-Challenge Message....................................................................................................................781
Configuring Challenge Response Authentication for SSHv2...........................................................................781
SMS-OTP Mechanism.............................................................................................................................................. 781
Configuring the System to Drop Certain ICMP Reply Messages........................................................................782
SSH Lockout Settings....................................................................................................................................................783
Dell EMC Networking OS Security Hardening......................................................................................................... 783
Dell EMC Networking OS Image Verification..................................................................................................... 783
22
Contents