Concept Guide

RADIUS........................................................................................................................................................................... 754
RADIUS Authentication...........................................................................................................................................754
Conguration Task List for RADIUS...................................................................................................................... 755
Support for Change of Authorization and Disconnect Messages packets...................................................... 759
TACACS+........................................................................................................................................................................ 770
Conguration Task List for TACACS+................................................................................................................... 770
TACACS+ Remote Authentication.........................................................................................................................772
Command Authorization......................................................................................................................................... 773
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................773
Enabling SCP and SSH..................................................................................................................................................773
Using SCP with SSH to Copy a Software Image.................................................................................................774
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................775
Conguring When to Re-generate an SSH Key ..................................................................................................775
Conguring the SSH Server Key Exchange Algorithm........................................................................................776
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 776
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 777
Conguring the SSH Server Cipher List............................................................................................................... 777
Conguring the SSH Client Cipher List.................................................................................................................778
Conguring DNS in the SSH Server......................................................................................................................778
Secure Shell Authentication....................................................................................................................................779
Troubleshooting SSH................................................................................................................................................781
Telnet............................................................................................................................................................................... 782
VTY Line and Access-Class Conguration..................................................................................................................782
VTY Line Local Authentication and Authorization............................................................................................... 782
VTY Line Remote Authentication and Authorization...........................................................................................783
VTY MAC-SA Filter Support...................................................................................................................................783
Role-Based Access Control.......................................................................................................................................... 784
Overview of RBAC...................................................................................................................................................784
User Roles.................................................................................................................................................................786
AAA Authentication and Authorization for Roles.................................................................................................790
Role Accounting....................................................................................................................................................... 792
Display Information About User Roles...................................................................................................................793
Two Factor Authentication (2FA)................................................................................................................................ 794
Handling Access-Challenge Message................................................................................................................... 795
Conguring Challenge Response Authentication for SSHv2............................................................................. 795
SMS-OTP Mechanism............................................................................................................................................795
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 796
Dell EMC Networking OS Security Hardening........................................................................................................... 797
Dell EMC Networking OS Image Verication....................................................................................................... 797
Startup Conguration Verication.........................................................................................................................799
Conguring the root User Password.....................................................................................................................800
Locking Access to GRUB Interface.......................................................................................................................800
Enabling User Lockout for Failed Login Attempts................................................................................................ 801
46 Service Provider Bridging........................................................................................................................ 802
VLAN Stacking...............................................................................................................................................................802
24
Contents