Install Guide

Table Of Contents
Configuration Task List for Privilege Levels.......................................................................................................658
RADIUS.............................................................................................................................................................................. 661
RADIUS Authentication........................................................................................................................................... 662
Configuration Task List for RADIUS.....................................................................................................................663
Support for Change of Authorization and Disconnect Messages packets.................................................665
TACACS+..........................................................................................................................................................................675
Configuration Task List for TACACS+................................................................................................................. 675
TACACS+ Remote Authentication........................................................................................................................ 677
Command Authorization..........................................................................................................................................678
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................678
Enabling SCP and SSH.................................................................................................................................................. 678
Using SCP with SSH to Copy a Software Image.............................................................................................. 679
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................680
Configuring When to Re-generate an SSH Key ............................................................................................... 680
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 680
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 681
Configuring the SSH Server Cipher List.............................................................................................................. 681
Configuring DNS in the SSH Server.....................................................................................................................682
Secure Shell Authentication................................................................................................................................... 682
Troubleshooting SSH............................................................................................................................................... 684
Telnet.................................................................................................................................................................................685
VTY Line and Access-Class Configuration............................................................................................................... 685
VTY Line Local Authentication and Authorization............................................................................................ 685
VTY Line Remote Authentication and Authorization........................................................................................686
VTY MAC-SA Filter Support...................................................................................................................................686
Role-Based Access Control.......................................................................................................................................... 687
Overview of RBAC....................................................................................................................................................687
User Roles...................................................................................................................................................................689
AAA Authentication and Authorization for Roles.............................................................................................. 692
Role Accounting........................................................................................................................................................ 694
Display Information About User Roles................................................................................................................. 695
Two Factor Authentication (2FA).............................................................................................................................. 696
Handling Access-Challenge Message...................................................................................................................697
Configuring Challenge Response Authentication for SSHv2..........................................................................697
SMS-OTP Mechanism..............................................................................................................................................697
Configuring the System to Drop Certain ICMP Reply Messages........................................................................698
Dell EMC Networking OS Security Hardening.........................................................................................................699
Dell EMC Networking OS Image Verification..................................................................................................... 699
Startup Configuration Verification........................................................................................................................700
Configuring the root User Password.....................................................................................................................701
Locking Access to GRUB Interface...................................................................................................................... 702
Enabling User Lockout for Failed Login Attempts.............................................................................................702
Chapter 46: Service Provider Bridging.......................................................................................703
VLAN Stacking.................................................................................................................................................................703
Configure VLAN Stacking....................................................................................................................................... 704
Creating Access and Trunk Ports......................................................................................................................... 705
Enable VLAN-Stacking for a VLAN.......................................................................................................................705
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................705
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................706
22
Contents