White Papers

TACACS+ Remote Authentication.........................................................................................................................744
Command Authorization......................................................................................................................................... 745
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 745
Enabling SCP and SSH..................................................................................................................................................745
Using SCP with SSH to Copy a Software Image.................................................................................................746
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................747
Conguring When to Re-generate an SSH Key .................................................................................................. 747
Conguring the SSH Server Key Exchange Algorithm........................................................................................748
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 748
Conguring the SSH Server Cipher List............................................................................................................... 749
Secure Shell Authentication....................................................................................................................................749
Troubleshooting SSH...............................................................................................................................................752
Telnet...............................................................................................................................................................................752
VTY Line and Access-Class Conguration................................................................................................................. 752
VTY Line Local Authentication and Authorization............................................................................................... 753
VTY Line Remote Authentication and Authorization...........................................................................................753
VTY MAC-SA Filter Support.................................................................................................................................. 754
Role-Based Access Control..........................................................................................................................................754
Overview of RBAC.................................................................................................................................................. 755
User Roles.................................................................................................................................................................757
AAA Authentication and Authorization for Roles.................................................................................................760
Role Accounting....................................................................................................................................................... 763
Display Information About User Roles...................................................................................................................763
Two Factor Authentication (2FA)................................................................................................................................ 765
Handling Access-Challenge Message................................................................................................................... 765
Conguring Challenge Response Authentication for SSHv2............................................................................. 765
SMS-OTP Mechanism............................................................................................................................................ 766
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 766
Dell EMC Networking OS Security Hardening........................................................................................................... 768
Dell EMC Networking OS Image Verication....................................................................................................... 768
Startup Conguration Verication......................................................................................................................... 769
Conguring the root User Password..................................................................................................................... 770
Enabling User Lockout for Failed Login Attempts.................................................................................................771
47 Service Provider Bridging.........................................................................................................................772
VLAN Stacking............................................................................................................................................................... 772
Important Points to Remember..............................................................................................................................773
Congure VLAN Stacking....................................................................................................................................... 773
Creating Access and Trunk Ports...........................................................................................................................774
Enable VLAN-Stacking for a VLAN....................................................................................................................... 775
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 775
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 775
Debugging VLAN Stacking..................................................................................................................................... 776
VLAN Stacking in Multi-Vendor Networks............................................................................................................777
VLAN Stacking Packet Drop Precedence................................................................................................................... 781
Enabling Drop Eligibility............................................................................................................................................ 781
24
Contents