Setup Guide

TACACS+........................................................................................................................................................................809
Conguration Task List for TACACS+...................................................................................................................809
TACACS+ Remote Authentication.......................................................................................................................... 811
Command Authorization..........................................................................................................................................812
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................812
Enabling SCP and SSH.................................................................................................................................................. 812
Using SCP with SSH to Copy a Software Image................................................................................................. 813
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................ 814
Conguring When to Re-generate an SSH Key .................................................................................................. 814
Conguring the SSH Server Key Exchange Algorithm........................................................................................815
Conguring the HMAC Algorithm for the SSH Server........................................................................................815
Conguring the SSH Server Cipher List................................................................................................................816
Conguring DNS in the SSH Server...................................................................................................................... 816
Secure Shell Authentication.................................................................................................................................... 817
Troubleshooting SSH................................................................................................................................................819
Telnet...............................................................................................................................................................................820
VTY Line and Access-Class Conguration................................................................................................................. 820
VTY Line Local Authentication and Authorization............................................................................................... 820
VTY Line Remote Authentication and Authorization........................................................................................... 821
VTY MAC-SA Filter Support................................................................................................................................... 821
Role-Based Access Control..........................................................................................................................................822
Overview of RBAC...................................................................................................................................................822
User Roles.................................................................................................................................................................824
AAA Authentication and Authorization for Roles.................................................................................................828
Role Accounting.......................................................................................................................................................830
Display Information About User Roles....................................................................................................................831
Two Factor Authentication (2FA)................................................................................................................................ 832
Handling Access-Challenge Message................................................................................................................... 833
Conguring Challenge Response Authentication for SSHv2............................................................................. 833
SMS-OTP Mechanism............................................................................................................................................833
Conguring the System to Drop Certain ICMP Reply Messages............................................................................834
Dell EMC Networking OS Security Hardening...........................................................................................................835
Dell EMC Networking OS Image Verication.......................................................................................................835
Startup Conguration Verication......................................................................................................................... 837
Conguring the root User Password.....................................................................................................................838
Enabling User Lockout for Failed Login Attempts............................................................................................... 838
49 Service Provider Bridging........................................................................................................................ 839
VLAN Stacking...............................................................................................................................................................839
Important Points to Remember............................................................................................................................. 840
Congure VLAN Stacking.......................................................................................................................................840
Creating Access and Trunk Ports........................................................................................................................... 841
Enable VLAN-Stacking for a VLAN.......................................................................................................................842
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 842
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................842
Debugging VLAN Stacking..................................................................................................................................... 843
Contents
25