Concept Guide

Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 830
Conguring When to Re-generate an SSH Key ..................................................................................................830
Conguring the SSH Server Key Exchange Algorithm........................................................................................831
Conguring the HMAC Algorithm for the SSH Server........................................................................................831
Conguring the HMAC Algorithm for the SSH Client.........................................................................................832
Conguring the SSH Server Cipher List...............................................................................................................832
Conguring the SSH Client Cipher List................................................................................................................ 833
Conguring DNS in the SSH Server......................................................................................................................833
Secure Shell Authentication................................................................................................................................... 834
Troubleshooting SSH...............................................................................................................................................836
Telnet............................................................................................................................................................................... 837
VTY Line and Access-Class Conguration..................................................................................................................837
VTY Line Local Authentication and Authorization............................................................................................... 837
VTY Line Remote Authentication and Authorization...........................................................................................838
VTY MAC-SA Filter Support.................................................................................................................................. 838
Role-Based Access Control..........................................................................................................................................839
Overview of RBAC.................................................................................................................................................. 839
User Roles................................................................................................................................................................. 841
AAA Authentication and Authorization for Roles.................................................................................................845
Role Accounting....................................................................................................................................................... 847
Display Information About User Roles...................................................................................................................848
Two Factor Authentication (2FA)................................................................................................................................ 849
Handling Access-Challenge Message...................................................................................................................850
Conguring Challenge Response Authentication for SSHv2.............................................................................850
SMS-OTP Mechanism............................................................................................................................................850
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................851
SSH Lockout Settings...................................................................................................................................................852
Dell EMC Networking OS Security Hardening...........................................................................................................853
Dell EMC Networking OS Image Verication.......................................................................................................853
Startup Conguration Verication.........................................................................................................................854
Conguring the root User Password.....................................................................................................................855
Enabling User Lockout for Failed Login Attempts............................................................................................... 856
46 Service Provider Bridging........................................................................................................................ 857
VLAN Stacking...............................................................................................................................................................857
Important Points to Remember............................................................................................................................. 858
Congure VLAN Stacking.......................................................................................................................................858
Creating Access and Trunk Ports.......................................................................................................................... 859
Enable VLAN-Stacking for a VLAN.......................................................................................................................860
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................860
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................860
Debugging VLAN Stacking......................................................................................................................................861
VLAN Stacking in Multi-Vendor Networks...........................................................................................................862
VLAN Stacking Packet Drop Precedence.................................................................................................................. 865
Enabling Drop Eligibility........................................................................................................................................... 865
Honoring the Incoming DEI Value..........................................................................................................................866
26
Contents