Users Guide

Table Of Contents
Conguration Task List for AAA Accounting......................................................................................................... 731
AAA Authentication....................................................................................................................................................... 733
Conguration Task List for AAA Authentication...................................................................................................734
Obscuring Passwords and Keys................................................................................................................................... 737
AAA Authorization..........................................................................................................................................................737
Privilege Levels Overview....................................................................................................................................... 737
Conguration Task List for Privilege Levels.......................................................................................................... 738
RADIUS............................................................................................................................................................................742
RADIUS Authentication........................................................................................................................................... 742
Conguration Task List for RADIUS.......................................................................................................................743
Support for Change of Authorization and Disconnect Messages packets.......................................................747
TACACS+........................................................................................................................................................................758
Conguration Task List for TACACS+................................................................................................................... 758
TACACS+ Remote Authentication.........................................................................................................................760
Command Authorization..........................................................................................................................................761
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................ 761
Enabling SCP and SSH.................................................................................................................................................. 761
Using SCP with SSH to Copy a Software Image.................................................................................................762
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................763
Conguring When to Re-generate an SSH Key ..................................................................................................763
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 764
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 764
Conguring the HMAC Algorithm for the SSH Client.........................................................................................765
Conguring the SSH Server Cipher List...............................................................................................................765
Conguring the SSH Client Cipher List.................................................................................................................766
Conguring DNS in the SSH Server......................................................................................................................766
Secure Shell Authentication....................................................................................................................................767
Troubleshooting SSH...............................................................................................................................................769
Telnet............................................................................................................................................................................... 770
VTY Line and Access-Class Conguration..................................................................................................................770
VTY Line Local Authentication and Authorization................................................................................................770
VTY Line Remote Authentication and Authorization............................................................................................771
VTY MAC-SA Filter Support................................................................................................................................... 771
Role-Based Access Control.......................................................................................................................................... 772
Overview of RBAC...................................................................................................................................................772
User Roles................................................................................................................................................................. 774
AAA Authentication and Authorization for Roles.................................................................................................778
Role Accounting.......................................................................................................................................................780
Display Information About User Roles....................................................................................................................781
Two Factor Authentication (2FA).................................................................................................................................782
Handling Access-Challenge Message................................................................................................................... 783
Conguring Challenge Response Authentication for SSHv2............................................................................. 783
SMS-OTP Mechanism............................................................................................................................................ 783
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 784
Dell EMC Networking OS Security Hardening........................................................................................................... 785
24
Contents