Administrator Guide

Configuration Task List for Privilege Levels....................................................................................................... 793
RADIUS.............................................................................................................................................................................. 797
RADIUS Authentication............................................................................................................................................797
Configuration Task List for RADIUS..................................................................................................................... 798
Support for Change of Authorization and Disconnect Messages packets..................................................801
TACACS+........................................................................................................................................................................... 811
Configuration Task List for TACACS+...................................................................................................................811
TACACS+ Remote Authentication.........................................................................................................................813
Command Authorization...........................................................................................................................................814
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 814
Enabling SCP and SSH................................................................................................................................................... 814
Using SCP with SSH to Copy a Software Image............................................................................................... 815
Removing the RSA Host Keys and Zeroizing Storage .....................................................................................816
Configuring When to Re-generate an SSH Key ................................................................................................ 816
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 816
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 817
Configuring the SSH Server Cipher List...............................................................................................................817
Configuring DNS in the SSH Server......................................................................................................................818
Secure Shell Authentication.................................................................................................................................... 818
Troubleshooting SSH............................................................................................................................................... 820
Telnet..................................................................................................................................................................................821
VTY Line and Access-Class Configuration................................................................................................................ 821
VTY Line Local Authentication and Authorization............................................................................................. 821
VTY Line Remote Authentication and Authorization........................................................................................822
VTY MAC-SA Filter Support...................................................................................................................................822
Role-Based Access Control.......................................................................................................................................... 823
Overview of RBAC....................................................................................................................................................823
User Roles...................................................................................................................................................................825
AAA Authentication and Authorization for Roles.............................................................................................. 828
Role Accounting......................................................................................................................................................... 831
Display Information About User Roles..................................................................................................................832
Two Factor Authentication (2FA)...............................................................................................................................833
Handling Access-Challenge Message...................................................................................................................833
Configuring Challenge Response Authentication for SSHv2..........................................................................833
SMS-OTP Mechanism..............................................................................................................................................834
Configuring the System to Drop Certain ICMP Reply Messages........................................................................834
Dell EMC Networking OS Security Hardening.........................................................................................................835
Dell EMC Networking OS Image Verification..................................................................................................... 836
Startup Configuration Verification........................................................................................................................ 837
Configuring the root User Password....................................................................................................................838
Locking Access to GRUB Interface...................................................................................................................... 838
Enabling User Lockout for Failed Login Attempts............................................................................................ 839
Chapter 50: Service Provider Bridging...................................................................................... 840
VLAN Stacking.................................................................................................................................................................840
Configure VLAN Stacking........................................................................................................................................ 841
Creating Access and Trunk Ports......................................................................................................................... 842
Enable VLAN-Stacking for a VLAN.......................................................................................................................842
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................843
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................843
Contents
23