Setup Guide

Table Of Contents
Command Authorization.............................................................................................................................................736
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................. 737
Enabling SCP and SSH..................................................................................................................................................... 737
Using SCP with SSH to Copy a Software Image.................................................................................................... 738
Removing the RSA Host Keys and Zeroizing Storage ...........................................................................................738
Configuring When to Re-generate an SSH Key ..................................................................................................... 739
Configuring the SSH Server Key Exchange Algorithm...........................................................................................739
Configuring the HMAC Algorithm for the SSH Server...........................................................................................739
Configuring the HMAC Algorithm for the SSH Client............................................................................................ 740
Configuring the SSH Server Cipher List...................................................................................................................740
Configuring the SSH Client Cipher List..................................................................................................................... 741
Configuring DNS in the SSH Server.......................................................................................................................... 741
Secure Shell Authentication....................................................................................................................................... 742
Troubleshooting SSH.................................................................................................................................................. 744
Telnet.................................................................................................................................................................................. 744
VTY Line and Access-Class Configuration.....................................................................................................................744
VTY Line Local Authentication and Authorization...................................................................................................745
VTY Line Remote Authentication and Authorization.............................................................................................. 745
VTY MAC-SA Filter Support...................................................................................................................................... 745
Role-Based Access Control..............................................................................................................................................746
Overview of RBAC...................................................................................................................................................... 746
User Roles.....................................................................................................................................................................748
AAA Authentication and Authorization for Roles..................................................................................................... 751
Role Accounting...........................................................................................................................................................753
Display Information About User Roles...................................................................................................................... 754
Two Factor Authentication (2FA)...................................................................................................................................755
Handling Access-Challenge Message.......................................................................................................................755
Configuring Challenge Response Authentication for SSHv2.................................................................................755
SMS-OTP Mechanism................................................................................................................................................756
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... 756
SSH Lockout Settings...................................................................................................................................................... 758
Dell EMC Networking OS Security Hardening.............................................................................................................. 758
Dell EMC Networking OS Image Verification...........................................................................................................758
Startup Configuration Verification............................................................................................................................ 759
Configuring the root User Password........................................................................................................................ 760
Locking Access to GRUB Interface.......................................................................................................................... 760
Enabling User Lockout for Failed Login Attempts................................................................................................... 761
48 Service Provider Bridging........................................................................................................ 762
VLAN Stacking...................................................................................................................................................................762
Configure VLAN Stacking...........................................................................................................................................763
Creating Access and Trunk Ports..............................................................................................................................764
Enable VLAN-Stacking for a VLAN...........................................................................................................................764
Configuring the Protocol Type Value for the Outer VLAN Tag............................................................................ 765
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 765
Debugging VLAN Stacking.........................................................................................................................................766
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. 766
VLAN Stacking Packet Drop Precedence......................................................................................................................769
Enabling Drop Eligibility............................................................................................................................................... 769
Honoring the Incoming DEI Value..............................................................................................................................770
Contents
23