Setup Guide

Table Of Contents
TACACS+ Remote Authentication........................................................................................................................720
Command Authorization...........................................................................................................................................721
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 721
Enabling SCP and SSH................................................................................................................................................... 721
Using SCP with SSH to Copy a Software Image...............................................................................................722
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 723
Configuring When to Re-generate an SSH Key ................................................................................................723
Configuring the SSH Server Key Exchange Algorithm.....................................................................................723
Configuring the HMAC Algorithm for the SSH Server.....................................................................................724
Configuring the SSH Server Cipher List..............................................................................................................724
Configuring DNS in the SSH Server..................................................................................................................... 725
Secure Shell Authentication................................................................................................................................... 725
Troubleshooting SSH................................................................................................................................................728
Telnet................................................................................................................................................................................. 728
VTY Line and Access-Class Configuration................................................................................................................728
VTY Line Local Authentication and Authorization.............................................................................................728
VTY Line Remote Authentication and Authorization........................................................................................ 729
VTY MAC-SA Filter Support...................................................................................................................................729
Role-Based Access Control.......................................................................................................................................... 730
Overview of RBAC....................................................................................................................................................730
User Roles................................................................................................................................................................... 732
AAA Authentication and Authorization for Roles.............................................................................................. 735
Role Accounting.........................................................................................................................................................738
Display Information About User Roles..................................................................................................................739
Two Factor Authentication (2FA)...............................................................................................................................740
Handling Access-Challenge Message...................................................................................................................740
Configuring Challenge Response Authentication for SSHv2..........................................................................740
SMS-OTP Mechanism.............................................................................................................................................. 741
Configuring the System to Drop Certain ICMP Reply Messages.........................................................................741
Dell EMC Networking OS Security Hardening......................................................................................................... 743
Dell EMC Networking OS Image Verification..................................................................................................... 743
Startup Configuration Verification........................................................................................................................ 744
Configuring the root User Password....................................................................................................................745
Enabling User Lockout for Failed Login Attempts.............................................................................................745
Chapter 49: Service Provider Bridging.......................................................................................746
VLAN Stacking.................................................................................................................................................................746
Configure VLAN Stacking........................................................................................................................................747
Creating Access and Trunk Ports..........................................................................................................................748
Enable VLAN-Stacking for a VLAN.......................................................................................................................748
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 749
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................749
Debugging VLAN Stacking......................................................................................................................................750
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 750
VLAN Stacking Packet Drop Precedence................................................................................................................. 754
Enabling Drop Eligibility............................................................................................................................................754
Honoring the Incoming DEI Value..........................................................................................................................754
Marking Egress Packets with a DEI Value.......................................................................................................... 755
Dynamic Mode CoS for VLAN Stacking.................................................................................................................... 755
Mapping C-Tag to S-Tag dot1p Values................................................................................................................757
22
Contents