White Papers

Table Of Contents
Configuration Task List for AAA Authentication............................................................................................... 687
Obscuring Passwords and Keys.................................................................................................................................. 690
AAA Authorization.......................................................................................................................................................... 690
Privilege Levels Overview.......................................................................................................................................690
Configuration Task List for Privilege Levels........................................................................................................691
RADIUS..............................................................................................................................................................................694
RADIUS Authentication........................................................................................................................................... 695
Configuration Task List for RADIUS.....................................................................................................................696
RADIUS-assigned dynamic access control lists.................................................................................................698
Support for Change of Authorization and Disconnect Messages packets................................................. 703
TACACS+...........................................................................................................................................................................713
Configuration Task List for TACACS+.................................................................................................................. 713
TACACS+ Remote Authentication.........................................................................................................................715
Command Authorization...........................................................................................................................................716
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 716
Enabling SCP and SSH................................................................................................................................................... 716
Using SCP with SSH to Copy a Software Image............................................................................................... 717
Removing the RSA Host Keys and Zeroizing Storage ..................................................................................... 718
Configuring When to Re-generate an SSH Key ................................................................................................ 718
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 718
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 719
Configuring the HMAC Algorithm for the SSH Client.......................................................................................719
Configuring the SSH Server Cipher List..............................................................................................................720
Configuring the SSH Client Cipher List............................................................................................................... 720
Configuring DNS in the SSH Server......................................................................................................................721
Secure Shell Authentication.................................................................................................................................... 721
Troubleshooting SSH................................................................................................................................................723
Telnet................................................................................................................................................................................. 724
VTY Line and Access-Class Configuration................................................................................................................724
VTY Line Local Authentication and Authorization.............................................................................................724
VTY Line Remote Authentication and Authorization........................................................................................ 725
VTY MAC-SA Filter Support...................................................................................................................................725
Role-Based Access Control.......................................................................................................................................... 725
Overview of RBAC....................................................................................................................................................726
User Roles................................................................................................................................................................... 728
AAA Authentication and Authorization for Roles............................................................................................... 731
Role Accounting.........................................................................................................................................................733
Display Information About User Roles..................................................................................................................734
Two Factor Authentication (2FA)...............................................................................................................................735
Handling Access-Challenge Message...................................................................................................................736
Configuring Challenge Response Authentication for SSHv2..........................................................................736
SMS-OTP Mechanism..............................................................................................................................................736
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 737
Dell EMC Networking OS Security Hardening......................................................................................................... 738
Dell EMC Networking OS Image Verification..................................................................................................... 738
Startup Configuration Verification........................................................................................................................ 739
Configuring the root User Password....................................................................................................................740
Locking Access to GRUB Interface....................................................................................................................... 741
Enabling User Lockout for Failed Login Attempts............................................................................................. 741
Contents
21