Concept Guide

TACACS+ Remote Authentication.........................................................................................................................883
Command Authorization.........................................................................................................................................884
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 884
Enabling SCP and SSH................................................................................................................................................. 884
Using SCP with SSH to Copy a Software Image................................................................................................ 885
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 886
Conguring When to Re-generate an SSH Key ..................................................................................................886
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 887
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 887
Conguring the HMAC Algorithm for the SSH Client.........................................................................................888
Conguring the SSH Server Cipher List...............................................................................................................888
Conguring the SSH Client Cipher List................................................................................................................ 889
Conguring DNS in the SSH Server..................................................................................................................... 889
Secure Shell Authentication................................................................................................................................... 890
Troubleshooting SSH...............................................................................................................................................892
Telnet...............................................................................................................................................................................893
VTY Line and Access-Class Conguration................................................................................................................. 893
VTY Line Local Authentication and Authorization............................................................................................... 893
VTY Line Remote Authentication and Authorization...........................................................................................894
VTY MAC-SA Filter Support.................................................................................................................................. 894
Role-Based Access Control..........................................................................................................................................895
Overview of RBAC.................................................................................................................................................. 895
User Roles.................................................................................................................................................................897
AAA Authentication and Authorization for Roles................................................................................................. 901
Role Accounting.......................................................................................................................................................903
Display Information About User Roles...................................................................................................................904
Two Factor Authentication (2FA)................................................................................................................................905
Handling Access-Challenge Message...................................................................................................................906
Conguring Challenge Response Authentication for SSHv2.............................................................................906
SMS-OTP Mechanism............................................................................................................................................906
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 907
Dell EMC Networking OS Security Hardening...........................................................................................................908
Dell EMC Networking OS Image Verication.......................................................................................................908
Startup Conguration Verication..........................................................................................................................910
Conguring the root User Password...................................................................................................................... 911
Locking Access to GRUB Interface.........................................................................................................................911
Enabling User Lockout for Failed Login Attempts................................................................................................ 912
51 Service Provider Bridging..........................................................................................................................913
VLAN Stacking................................................................................................................................................................913
Important Points to Remember.............................................................................................................................. 914
Congure VLAN Stacking....................................................................................................................................... 914
Creating Access and Trunk Ports...........................................................................................................................915
Enable VLAN-Stacking for a VLAN........................................................................................................................916
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................916
Conguring Dell EMC Networking OS Options for Trunk Ports.........................................................................916
Contents
27