White Papers

Table Of Contents
TACACS+ Remote Authentication........................................................................................................................ 778
Command Authorization.......................................................................................................................................... 779
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................779
Enabling SCP and SSH...................................................................................................................................................779
Using SCP with SSH to Copy a Software Image.............................................................................................. 780
Removing the RSA Host Keys and Zeroizing Storage ..................................................................................... 781
Configuring When to Re-generate an SSH Key ................................................................................................ 781
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 781
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 782
Configuring the HMAC Algorithm for the SSH Client...................................................................................... 782
Configuring the SSH Server Cipher List..............................................................................................................783
Configuring the SSH Client Cipher List............................................................................................................... 783
Configuring DNS in the SSH Server..................................................................................................................... 784
Secure Shell Authentication................................................................................................................................... 784
Troubleshooting SSH................................................................................................................................................787
Telnet................................................................................................................................................................................. 787
VTY Line and Access-Class Configuration................................................................................................................ 787
VTY Line Local Authentication and Authorization.............................................................................................787
VTY Line Remote Authentication and Authorization........................................................................................ 788
VTY MAC-SA Filter Support...................................................................................................................................788
Role-Based Access Control.......................................................................................................................................... 789
Overview of RBAC....................................................................................................................................................789
User Roles....................................................................................................................................................................791
AAA Authentication and Authorization for Roles.............................................................................................. 794
Role Accounting.........................................................................................................................................................797
Display Information About User Roles..................................................................................................................798
Two Factor Authentication (2FA)...............................................................................................................................799
Handling Access-Challenge Message...................................................................................................................799
Configuring Challenge Response Authentication for SSHv2..........................................................................799
SMS-OTP Mechanism............................................................................................................................................. 800
Configuring the System to Drop Certain ICMP Reply Messages....................................................................... 800
SSH Lockout Settings................................................................................................................................................... 802
Dell EMC Networking OS Security Hardening.........................................................................................................802
Dell EMC Networking OS Image Verification..................................................................................................... 802
Startup Configuration Verification........................................................................................................................803
Configuring the root User Password....................................................................................................................804
Locking Access to GRUB Interface...................................................................................................................... 804
Enabling User Lockout for Failed Login Attempts............................................................................................ 805
Chapter 48: Service Provider Bridging...................................................................................... 806
VLAN Stacking................................................................................................................................................................ 806
Configure VLAN Stacking....................................................................................................................................... 807
Creating Access and Trunk Ports......................................................................................................................... 808
Enable VLAN-Stacking for a VLAN.......................................................................................................................808
Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................809
Configuring Dell EMC Networking OS Options for Trunk Ports................................................................... 809
Debugging VLAN Stacking...................................................................................................................................... 810
VLAN Stacking in Multi-Vendor Networks.......................................................................................................... 810
VLAN Stacking Packet Drop Precedence..................................................................................................................813
Enabling Drop Eligibility............................................................................................................................................ 813
Contents
23