White Papers

47 Security................................................................................................................................................... 792
AAA Accounting.............................................................................................................................................................792
Conguration Task List for AAA Accounting........................................................................................................ 792
AAA Authentication....................................................................................................................................................... 794
Conguration Task List for AAA Authentication.................................................................................................. 795
Obscuring Passwords and Keys...................................................................................................................................798
AAA Authorization......................................................................................................................................................... 798
Privilege Levels Overview.......................................................................................................................................798
Conguration Task List for Privilege Levels.......................................................................................................... 799
RADIUS........................................................................................................................................................................... 803
RADIUS Authentication...........................................................................................................................................803
Conguration Task List for RADIUS...................................................................................................................... 804
Support for Change of Authorization and Disconnect Messages packets...................................................... 808
TACACS+.........................................................................................................................................................................817
Conguration Task List for TACACS+....................................................................................................................817
TACACS+ Remote Authentication......................................................................................................................... 819
Command Authorization.........................................................................................................................................820
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 820
Enabling SCP and SSH................................................................................................................................................. 820
Using SCP with SSH to Copy a Software Image................................................................................................. 821
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................822
Conguring When to Re-generate an SSH Key ..................................................................................................822
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 823
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 823
Conguring the SSH Server Cipher List............................................................................................................... 824
Secure Shell Authentication................................................................................................................................... 824
Troubleshooting SSH............................................................................................................................................... 827
Telnet............................................................................................................................................................................... 827
VTY Line and Access-Class Conguration..................................................................................................................827
VTY Line Local Authentication and Authorization............................................................................................... 828
VTY Line Remote Authentication and Authorization...........................................................................................828
VTY MAC-SA Filter Support.................................................................................................................................. 829
Role-Based Access Control..........................................................................................................................................829
Overview of RBAC.................................................................................................................................................. 830
User Roles.................................................................................................................................................................832
AAA Authentication and Authorization for Roles.................................................................................................835
Role Accounting.......................................................................................................................................................838
Display Information About User Roles...................................................................................................................838
Two Factor Authentication (2FA)................................................................................................................................ 840
Handling Access-Challenge Message................................................................................................................... 840
Conguring Challenge Response Authentication for SSHv2............................................................................. 840
SMS-OTP Mechanism.............................................................................................................................................841
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................841
Dell EMC Networking OS Security Hardening...........................................................................................................843
Dell EMC Networking OS Image Verication....................................................................................................... 843
Contents
25