Install Guide

Table Of Contents
Configuration Task List for Privilege Levels....................................................................................................... 787
RADIUS..............................................................................................................................................................................790
RADIUS Authentication............................................................................................................................................ 791
Configuration Task List for RADIUS..................................................................................................................... 792
Support for Change of Authorization and Disconnect Messages packets................................................. 794
TACACS+..........................................................................................................................................................................804
Configuration Task List for TACACS+.................................................................................................................804
TACACS+ Remote Authentication........................................................................................................................806
Command Authorization..........................................................................................................................................807
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................807
Enabling SCP and SSH.................................................................................................................................................. 807
Using SCP with SSH to Copy a Software Image.............................................................................................. 808
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................809
Configuring When to Re-generate an SSH Key ............................................................................................... 809
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 809
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 810
Configuring the SSH Server Cipher List.............................................................................................................. 810
Configuring DNS in the SSH Server...................................................................................................................... 811
Secure Shell Authentication.....................................................................................................................................811
Troubleshooting SSH................................................................................................................................................ 814
Telnet..................................................................................................................................................................................814
VTY Line and Access-Class Configuration................................................................................................................ 814
VTY Line Local Authentication and Authorization............................................................................................. 814
VTY Line Remote Authentication and Authorization.........................................................................................815
VTY MAC-SA Filter Support................................................................................................................................... 815
Role-Based Access Control...........................................................................................................................................816
Overview of RBAC.................................................................................................................................................... 816
User Roles....................................................................................................................................................................818
AAA Authentication and Authorization for Roles............................................................................................... 821
Role Accounting........................................................................................................................................................ 824
Display Information About User Roles..................................................................................................................825
Two Factor Authentication (2FA)...............................................................................................................................826
Handling Access-Challenge Message...................................................................................................................826
Configuring Challenge Response Authentication for SSHv2..........................................................................826
SMS-OTP Mechanism..............................................................................................................................................827
Configuring the System to Drop Certain ICMP Reply Messages........................................................................827
Dell EMC Networking OS Security Hardening.........................................................................................................829
Dell EMC Networking OS Image Verification..................................................................................................... 829
Startup Configuration Verification........................................................................................................................830
Configuring the root User Password.................................................................................................................... 831
Locking Access to GRUB Interface.......................................................................................................................831
Enabling User Lockout for Failed Login Attempts............................................................................................ 832
Chapter 50: Service Provider Bridging...................................................................................... 833
VLAN Stacking.................................................................................................................................................................833
Configure VLAN Stacking....................................................................................................................................... 834
Creating Access and Trunk Ports......................................................................................................................... 835
Enable VLAN-Stacking for a VLAN.......................................................................................................................835
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................836
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................836
Contents
23