Deployment Guide

Table Of Contents
Configuring When to Re-generate an SSH Key ................................................................................................783
Configuring the SSH Server Key Exchange Algorithm.....................................................................................783
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 784
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 784
Configuring the SSH Server Cipher List..............................................................................................................785
Configuring the SSH Client Cipher List............................................................................................................... 785
Configuring DNS in the SSH Server..................................................................................................................... 786
Secure Shell Authentication................................................................................................................................... 786
Troubleshooting SSH................................................................................................................................................789
Telnet................................................................................................................................................................................. 789
VTY Line and Access-Class Configuration................................................................................................................789
VTY Line Local Authentication and Authorization.............................................................................................789
VTY Line Remote Authentication and Authorization........................................................................................790
VTY MAC-SA Filter Support...................................................................................................................................790
Role-Based Access Control...........................................................................................................................................791
Overview of RBAC.....................................................................................................................................................791
User Roles................................................................................................................................................................... 793
AAA Authentication and Authorization for Roles.............................................................................................. 796
Role Accounting.........................................................................................................................................................799
Display Information About User Roles................................................................................................................. 800
Two Factor Authentication (2FA)............................................................................................................................... 801
Handling Access-Challenge Message................................................................................................................... 801
Configuring Challenge Response Authentication for SSHv2.......................................................................... 801
SMS-OTP Mechanism............................................................................................................................................. 802
Configuring the System to Drop Certain ICMP Reply Messages........................................................................802
Dell EMC Networking OS Security Hardening.........................................................................................................804
Dell EMC Networking OS Image Verification..................................................................................................... 804
Startup Configuration Verification........................................................................................................................805
Configuring the root User Password....................................................................................................................806
Locking Access to GRUB Interface...................................................................................................................... 806
Enabling User Lockout for Failed Login Attempts.............................................................................................807
Chapter 48: Service Provider Bridging.......................................................................................808
VLAN Stacking................................................................................................................................................................ 808
Configure VLAN Stacking....................................................................................................................................... 809
Creating Access and Trunk Ports.......................................................................................................................... 810
Enable VLAN-Stacking for a VLAN....................................................................................................................... 810
Configuring the Protocol Type Value for the Outer VLAN Tag...................................................................... 811
Configuring Dell EMC Networking OS Options for Trunk Ports..................................................................... 811
Debugging VLAN Stacking.......................................................................................................................................812
VLAN Stacking in Multi-Vendor Networks.......................................................................................................... 812
VLAN Stacking Packet Drop Precedence..................................................................................................................815
Enabling Drop Eligibility............................................................................................................................................ 815
Honoring the Incoming DEI Value.......................................................................................................................... 816
Marking Egress Packets with a DEI Value........................................................................................................... 816
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 817
Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 818
Layer 2 Protocol Tunneling........................................................................................................................................... 819
Enabling Layer 2 Protocol Tunneling....................................................................................................................820
Specifying a Destination MAC Address for BPDUs........................................................................................... 821
Contents
23