White Papers

Table Of Contents
Configuration Task List for Privilege Levels....................................................................................................... 786
RADIUS..............................................................................................................................................................................789
RADIUS Authentication............................................................................................................................................790
Configuration Task List for RADIUS......................................................................................................................791
Support for Change of Authorization and Disconnect Messages packets................................................. 793
TACACS+..........................................................................................................................................................................803
Configuration Task List for TACACS+.................................................................................................................803
TACACS+ Remote Authentication........................................................................................................................805
Command Authorization..........................................................................................................................................806
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 806
Enabling SCP and SSH.................................................................................................................................................. 806
Using SCP with SSH to Copy a Software Image.............................................................................................. 807
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 808
Configuring When to Re-generate an SSH Key ............................................................................................... 808
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 808
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 809
Configuring the SSH Server Cipher List............................................................................................................. 809
Configuring DNS in the SSH Server......................................................................................................................810
Secure Shell Authentication.................................................................................................................................... 810
Troubleshooting SSH................................................................................................................................................ 813
Telnet..................................................................................................................................................................................813
VTY Line and Access-Class Configuration................................................................................................................ 813
VTY Line Local Authentication and Authorization............................................................................................. 813
VTY Line Remote Authentication and Authorization.........................................................................................814
VTY MAC-SA Filter Support................................................................................................................................... 814
Role-Based Access Control...........................................................................................................................................815
Overview of RBAC.................................................................................................................................................... 815
User Roles....................................................................................................................................................................817
AAA Authentication and Authorization for Roles.............................................................................................. 820
Role Accounting........................................................................................................................................................ 823
Display Information About User Roles..................................................................................................................824
Two Factor Authentication (2FA).............................................................................................................................. 825
Handling Access-Challenge Message...................................................................................................................825
Configuring Challenge Response Authentication for SSHv2......................................................................... 825
SMS-OTP Mechanism............................................................................................................................................. 826
Configuring the System to Drop Certain ICMP Reply Messages........................................................................826
Dell EMC Networking OS Security Hardening......................................................................................................... 828
Dell EMC Networking OS Image Verification..................................................................................................... 828
Startup Configuration Verification........................................................................................................................829
Configuring the root User Password....................................................................................................................830
Locking Access to GRUB Interface...................................................................................................................... 830
Enabling User Lockout for Failed Login Attempts............................................................................................. 831
Chapter 50: Service Provider Bridging...................................................................................... 832
VLAN Stacking.................................................................................................................................................................832
Configure VLAN Stacking....................................................................................................................................... 833
Creating Access and Trunk Ports......................................................................................................................... 834
Enable VLAN-Stacking for a VLAN.......................................................................................................................834
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................835
Configuring Dell EMC Networking OS Options for Trunk Ports................................................................... 835
Contents
23