Concept Guide
Conguration Task List for Privilege Levels.......................................................................................................... 762
RADIUS........................................................................................................................................................................... 766
RADIUS Authentication...........................................................................................................................................766
Conguration Task List for RADIUS.......................................................................................................................768
RADIUS-assigned dynamic access control lists.................................................................................................... 771
Support for Change of Authorization and Disconnect Messages packets.......................................................776
TACACS+........................................................................................................................................................................ 787
Conguration Task List for TACACS+....................................................................................................................787
TACACS+ Remote Authentication.........................................................................................................................789
Command Authorization.........................................................................................................................................790
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 790
Enabling SCP and SSH................................................................................................................................................. 790
Using SCP with SSH to Copy a Software Image................................................................................................. 791
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................792
Conguring When to Re-generate an SSH Key ..................................................................................................792
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 793
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 793
Conguring the HMAC Algorithm for the SSH Client.........................................................................................794
Conguring the SSH Server Cipher List...............................................................................................................795
Conguring the SSH Client Cipher List................................................................................................................ 795
Conguring DNS in the SSH Server......................................................................................................................796
Secure Shell Authentication................................................................................................................................... 796
Troubleshooting SSH...............................................................................................................................................799
Telnet...............................................................................................................................................................................799
VTY Line and Access-Class Conguration................................................................................................................. 799
VTY Line Local Authentication and Authorization............................................................................................... 799
VTY Line Remote Authentication and Authorization.......................................................................................... 800
VTY MAC-SA Filter Support.................................................................................................................................. 800
Role-Based Access Control...........................................................................................................................................801
Overview of RBAC...................................................................................................................................................801
User Roles................................................................................................................................................................ 804
AAA Authentication and Authorization for Roles.................................................................................................807
Role Accounting........................................................................................................................................................810
Display Information About User Roles....................................................................................................................810
Two Factor Authentication (2FA).................................................................................................................................812
Handling Access-Challenge Message....................................................................................................................812
Conguring Challenge Response Authentication for SSHv2..............................................................................812
SMS-OTP Mechanism.............................................................................................................................................813
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................813
Dell EMC Networking OS Security Hardening............................................................................................................815
Dell EMC Networking OS Image Verication........................................................................................................815
Startup Conguration Verication..........................................................................................................................816
Conguring the root User Password......................................................................................................................817
Locking Access to GRUB Interface........................................................................................................................818
Enabling User Lockout for Failed Login Attempts................................................................................................ 818
24
Contents