API Guide

Table Of Contents
Privilege Levels Overview............................................................................................................................................811
Configuration Task List for Privilege Levels.............................................................................................................. 811
RADIUS............................................................................................................................................................................... 815
RADIUS Authentication and Authorization............................................................................................................... 815
Configuration Task List for RADIUS.......................................................................................................................... 816
Support for Change of Authorization and Disconnect Messages packets...........................................................819
TACACS+...........................................................................................................................................................................826
Configuration Task List for TACACS+......................................................................................................................826
TACACS+ Remote Authentication and Authorization............................................................................................828
Command Authorization.............................................................................................................................................829
Protection from TCP Tiny and Overlapping Fragment Attacks..................................................................................829
Enabling SCP and SSH.....................................................................................................................................................829
Using SCP with SSH to Copy a Software Image....................................................................................................830
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................... 831
Configuring When to Re-generate an SSH Key ......................................................................................................831
Configuring the SSH Server Cipher List................................................................................................................... 831
Configuring DNS in the SSH Server......................................................................................................................... 832
Configuring the HMAC Algorithm for the SSH Server...........................................................................................832
Configuring the HMAC Algorithm for the SSH Client............................................................................................ 832
Configuring the SSH Server Cipher List...................................................................................................................833
Configuring the SSH Client Cipher List.................................................................................................................... 833
Secure Shell Authentication.......................................................................................................................................834
Troubleshooting SSH..................................................................................................................................................836
Telnet..................................................................................................................................................................................836
VTY Line and Access-Class Configuration.....................................................................................................................836
VTY Line Local Authentication and Authorization...................................................................................................837
VTY Line Remote Authentication and Authorization.............................................................................................. 837
VTY MAC-SA Filter Support......................................................................................................................................838
Two Factor Authentication (2FA)...................................................................................................................................838
Handling Access-Challenge Message.......................................................................................................................838
Configuring Challenge Response Authentication for SSHv2.................................................................................838
SMS-OTP Mechanism................................................................................................................................................839
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... 839
Dell EMC Networking OS Security Hardening............................................................................................................... 841
Startup Configuration Verification............................................................................................................................. 841
Configuring the root User Password........................................................................................................................ 842
Enabling User Lockout for Failed Login Attempts...................................................................................................842
51 Service Provider Bridging........................................................................................................ 843
VLAN Stacking.................................................................................................................................................................. 843
Configure VLAN Stacking.......................................................................................................................................... 844
Creating Access and Trunk Ports............................................................................................................................. 845
Enable VLAN-Stacking for a VLAN...........................................................................................................................845
Configuring the Protocol Type Value for the Outer VLAN Tag............................................................................ 846
Configuring Options for Trunk Ports........................................................................................................................ 846
Debugging VLAN Stacking......................................................................................................................................... 847
VLAN Stacking in Multi-Vendor Networks...............................................................................................................847
VLAN Stacking Packet Drop Precedence..................................................................................................................... 850
Enabling Drop Eligibility...............................................................................................................................................850
Honoring the Incoming DEI Value.............................................................................................................................. 851
Contents
25