Setup Guide

Conguring DNS in the SSH Server......................................................................................................................944
Conguring the HMAC Algorithm for the SSH Server.......................................................................................945
Conguring the HMAC Algorithm for the SSH Client........................................................................................ 945
Conguring the SSH Server Cipher List...............................................................................................................946
Conguring the SSH Client Cipher List................................................................................................................ 946
Secure Shell Authentication................................................................................................................................... 947
Troubleshooting SSH...............................................................................................................................................949
Telnet...............................................................................................................................................................................950
VTY Line and Access-Class Conguration.................................................................................................................950
VTY Line Local Authentication and Authorization...............................................................................................950
VTY Line Remote Authentication and Authorization........................................................................................... 951
VTY MAC-SA Filter Support................................................................................................................................... 951
Two Factor Authentication (2FA)................................................................................................................................ 952
Handling Access-Challenge Message................................................................................................................... 952
Conguring Challenge Response Authentication for SSHv2............................................................................. 952
SMS-OTP Mechanism............................................................................................................................................953
Conguring the System to Drop Certain ICMP Reply Messages............................................................................953
Dell EMC Networking OS Security Hardening...........................................................................................................955
Startup Conguration Verication.........................................................................................................................955
Conguring the root User Password.....................................................................................................................956
Enabling User Lockout for Failed Login Attempts............................................................................................... 956
51 Service Provider Bridging......................................................................................................................... 957
VLAN Stacking...............................................................................................................................................................957
Important Points to Remember............................................................................................................................. 958
Congure VLAN Stacking.......................................................................................................................................959
Creating Access and Trunk Ports.......................................................................................................................... 959
Enable VLAN-Stacking for a VLAN.......................................................................................................................960
Conguring the Protocol Type Value for the Outer VLAN Tag..........................................................................960
Conguring Options for Trunk Ports.....................................................................................................................960
Debugging VLAN Stacking......................................................................................................................................961
VLAN Stacking in Multi-Vendor Networks...........................................................................................................962
VLAN Stacking Packet Drop Precedence.................................................................................................................. 965
Enabling Drop Eligibility........................................................................................................................................... 965
Honoring the Incoming DEI Value..........................................................................................................................966
Marking Egress Packets with a DEI Value............................................................................................................ 967
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 967
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................968
Layer 2 Protocol Tunneling........................................................................................................................................... 969
Implementation Information.....................................................................................................................................971
Enabling Layer 2 Protocol Tunneling.......................................................................................................................971
Specifying a Destination MAC Address for BPDUs............................................................................................. 972
Setting Rate-Limit BPDUs...................................................................................................................................... 972
Debugging Layer 2 Protocol Tunneling..................................................................................................................973
Provider Backbone Bridging......................................................................................................................................... 973
Contents
29