Deployment Guide

Table Of Contents
Configuration Task List for RADIUS.....................................................................................................................849
Support for Change of Authorization and Disconnect Messages packets................................................. 852
TACACS+..........................................................................................................................................................................860
Configuration Task List for TACACS+.................................................................................................................860
TACACS+ Remote Authentication and Authorization...................................................................................... 861
Command Authorization..........................................................................................................................................862
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 863
Enabling SCP and SSH.................................................................................................................................................. 863
Using SCP with SSH to Copy a Software Image.............................................................................................. 864
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 864
Configuring When to Re-generate an SSH Key ............................................................................................... 865
Configuring the SSH Server Cipher List............................................................................................................. 865
Configuring DNS in the SSH Server.....................................................................................................................866
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 866
Configuring the HMAC Algorithm for the SSH Client......................................................................................866
Configuring the SSH Server Cipher List..............................................................................................................867
Configuring the SSH Client Cipher List............................................................................................................... 867
Secure Shell Authentication................................................................................................................................... 868
Troubleshooting SSH................................................................................................................................................870
Telnet................................................................................................................................................................................. 870
VTY Line and Access-Class Configuration.................................................................................................................871
VTY Line Local Authentication and Authorization..............................................................................................871
VTY Line Remote Authentication and Authorization........................................................................................ 872
VTY MAC-SA Filter Support...................................................................................................................................872
Two Factor Authentication (2FA)...............................................................................................................................872
Handling Access-Challenge Message...................................................................................................................873
Configuring Challenge Response Authentication for SSHv2..........................................................................873
SMS-OTP Mechanism..............................................................................................................................................873
Configuring the System to Drop Certain ICMP Reply Messages........................................................................874
Dell EMC Networking OS Security Hardening......................................................................................................... 875
Startup Configuration Verification........................................................................................................................875
Configuring the root User Password....................................................................................................................876
Enabling User Lockout for Failed Login Attempts.............................................................................................877
Chapter 51: Service Provider Bridging....................................................................................... 878
VLAN Stacking.................................................................................................................................................................878
Configure VLAN Stacking....................................................................................................................................... 880
Creating Access and Trunk Ports......................................................................................................................... 880
Enable VLAN-Stacking for a VLAN....................................................................................................................... 881
Configuring the Protocol Type Value for the Outer VLAN Tag......................................................................881
Configuring Options for Trunk Ports.................................................................................................................... 881
Debugging VLAN Stacking......................................................................................................................................882
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 882
VLAN Stacking Packet Drop Precedence.................................................................................................................885
Enabling Drop Eligibility........................................................................................................................................... 885
Honoring the Incoming DEI Value......................................................................................................................... 886
Marking Egress Packets with a DEI Value.......................................................................................................... 886
Dynamic Mode CoS for VLAN Stacking.................................................................................................................... 887
Mapping C-Tag to S-Tag dot1p Values............................................................................................................... 888
Layer 2 Protocol Tunneling...........................................................................................................................................889
Contents
25