Setup Guide

Table Of Contents
Obscuring Passwords and Keys.................................................................................................................................. 680
AAA Authorization.......................................................................................................................................................... 680
Privilege Levels Overview.......................................................................................................................................680
Configuration Task List for Privilege Levels........................................................................................................681
RADIUS..............................................................................................................................................................................684
RADIUS Authentication........................................................................................................................................... 685
Configuration Task List for RADIUS.....................................................................................................................686
Support for Change of Authorization and Disconnect Messages packets................................................. 688
TACACS+..........................................................................................................................................................................698
Configuration Task List for TACACS+.................................................................................................................698
TACACS+ Remote Authentication........................................................................................................................700
Command Authorization...........................................................................................................................................701
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 701
Enabling SCP and SSH................................................................................................................................................... 701
Using SCP with SSH to Copy a Software Image.............................................................................................. 702
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 703
Configuring When to Re-generate an SSH Key ............................................................................................... 703
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 703
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 704
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 704
Configuring the SSH Server Cipher List..............................................................................................................705
Configuring the SSH Client Cipher List............................................................................................................... 705
Configuring DNS in the SSH Server.....................................................................................................................706
Secure Shell Authentication................................................................................................................................... 706
Troubleshooting SSH............................................................................................................................................... 709
Telnet................................................................................................................................................................................. 709
VTY Line and Access-Class Configuration................................................................................................................709
VTY Line Local Authentication and Authorization.............................................................................................709
VTY Line Remote Authentication and Authorization.........................................................................................710
VTY MAC-SA Filter Support....................................................................................................................................710
Role-Based Access Control............................................................................................................................................711
Overview of RBAC......................................................................................................................................................711
User Roles....................................................................................................................................................................713
AAA Authentication and Authorization for Roles............................................................................................... 716
Role Accounting......................................................................................................................................................... 719
Display Information About User Roles..................................................................................................................720
Two Factor Authentication (2FA)................................................................................................................................721
Handling Access-Challenge Message....................................................................................................................721
Configuring Challenge Response Authentication for SSHv2...........................................................................721
SMS-OTP Mechanism..............................................................................................................................................722
Configuring the System to Drop Certain ICMP Reply Messages........................................................................722
Dell EMC Networking OS Security Hardening......................................................................................................... 724
Dell EMC Networking OS Image Verification..................................................................................................... 724
Startup Configuration Verification........................................................................................................................725
Configuring the root User Password....................................................................................................................726
Locking Access to GRUB Interface...................................................................................................................... 726
Enabling User Lockout for Failed Login Attempts.............................................................................................727
Chapter 46: Service Provider Bridging.......................................................................................728
VLAN Stacking.................................................................................................................................................................728
Contents
21