Deployment Guide
Configuring When to Re-generate an SSH Key ................................................................................................792
Configuring the SSH Server Key Exchange Algorithm.....................................................................................792
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 793
Configuring the HMAC Algorithm for the SSH Client......................................................................................793
Configuring the SSH Server Cipher List..............................................................................................................794
Configuring the SSH Client Cipher List............................................................................................................... 794
Configuring DNS in the SSH Server.....................................................................................................................795
Secure Shell Authentication................................................................................................................................... 795
Troubleshooting SSH................................................................................................................................................797
Telnet................................................................................................................................................................................. 798
VTY Line and Access-Class Configuration................................................................................................................798
VTY Line Local Authentication and Authorization.............................................................................................798
VTY Line Remote Authentication and Authorization........................................................................................799
VTY MAC-SA Filter Support...................................................................................................................................799
Role-Based Access Control..........................................................................................................................................800
Overview of RBAC....................................................................................................................................................800
User Roles...................................................................................................................................................................802
AAA Authentication and Authorization for Roles.............................................................................................. 805
Role Accounting........................................................................................................................................................ 808
Display Information About User Roles................................................................................................................. 809
Two Factor Authentication (2FA)............................................................................................................................... 810
Handling Access-Challenge Message................................................................................................................... 810
Configuring Challenge Response Authentication for SSHv2.......................................................................... 810
SMS-OTP Mechanism............................................................................................................................................... 811
Configuring the System to Drop Certain ICMP Reply Messages......................................................................... 811
Dell EMC Networking OS Security Hardening..........................................................................................................812
Dell EMC Networking OS Image Verification......................................................................................................813
Startup Configuration Verification.........................................................................................................................814
Configuring the root User Password.................................................................................................................... 815
Locking Access to GRUB Interface.......................................................................................................................815
Enabling User Lockout for Failed Login Attempts............................................................................................. 816
Chapter 48: Service Provider Bridging....................................................................................... 817
VLAN Stacking..................................................................................................................................................................817
Configure VLAN Stacking........................................................................................................................................ 818
Creating Access and Trunk Ports.......................................................................................................................... 819
Enable VLAN-Stacking for a VLAN....................................................................................................................... 819
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................820
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................820
Debugging VLAN Stacking.......................................................................................................................................821
VLAN Stacking in Multi-Vendor Networks.......................................................................................................... 821
VLAN Stacking Packet Drop Precedence.................................................................................................................824
Enabling Drop Eligibility............................................................................................................................................824
Honoring the Incoming DEI Value..........................................................................................................................825
Marking Egress Packets with a DEI Value.......................................................................................................... 825
Dynamic Mode CoS for VLAN Stacking.................................................................................................................... 826
Mapping C-Tag to S-Tag dot1p Values................................................................................................................827
Layer 2 Protocol Tunneling...........................................................................................................................................828
Enabling Layer 2 Protocol Tunneling....................................................................................................................829
Specifying a Destination MAC Address for BPDUs.......................................................................................... 830
Contents
23