Concept Guide

Table Of Contents
Configure RADIUS attributes 8, 87 and 168........................................................................................................ 721
RADIUS-assigned dynamic access control lists..................................................................................................721
Support for Change of Authorization and Disconnect Messages packets................................................. 726
TACACS+..........................................................................................................................................................................736
Configuration Task List for TACACS+................................................................................................................. 736
TACACS+ Remote Authentication........................................................................................................................738
Command Authorization.......................................................................................................................................... 739
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................739
Enabling SCP and SSH.................................................................................................................................................. 739
Using SCP with SSH to Copy a Software Image.............................................................................................. 740
Removing the RSA Host Keys and Zeroizing Storage ..................................................................................... 741
Configuring When to Re-generate an SSH Key ................................................................................................ 741
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 741
Configuring the HMAC Algorithm for the SSH Server.....................................................................................742
Configuring the SSH Server Cipher List..............................................................................................................742
Configuring DNS in the SSH Server..................................................................................................................... 743
Secure Shell Authentication....................................................................................................................................743
Troubleshooting SSH................................................................................................................................................745
Telnet................................................................................................................................................................................. 746
VTY Line and Access-Class Configuration................................................................................................................746
VTY Line Local Authentication and Authorization.............................................................................................746
VTY Line Remote Authentication and Authorization........................................................................................ 747
VTY MAC-SA Filter Support................................................................................................................................... 747
Role-Based Access Control.......................................................................................................................................... 747
Overview of RBAC.................................................................................................................................................... 748
User Roles...................................................................................................................................................................750
AAA Authentication and Authorization for Roles.............................................................................................. 753
Role Accounting........................................................................................................................................................ 755
Display Information About User Roles..................................................................................................................756
Two Factor Authentication (2FA)...............................................................................................................................757
Handling Access-Challenge Message...................................................................................................................758
Configuring Challenge Response Authentication for SSHv2..........................................................................758
SMS-OTP Mechanism..............................................................................................................................................758
Configuring the System to Drop Certain ICMP Reply Messages........................................................................759
Dell EMC Networking OS Security Hardening......................................................................................................... 760
Dell EMC Networking OS Image Verification..................................................................................................... 760
Startup Configuration Verification.........................................................................................................................761
Configuring the root User Password....................................................................................................................762
Enabling User Lockout for Failed Login Attempts.............................................................................................763
Chapter 49: Service Provider Bridging.......................................................................................764
VLAN Stacking.................................................................................................................................................................764
Configure VLAN Stacking....................................................................................................................................... 765
Creating Access and Trunk Ports......................................................................................................................... 766
Enable VLAN-Stacking for a VLAN.......................................................................................................................766
Configuring the Protocol Type Value for the Outer VLAN Tag..................................................................... 767
Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................767
Debugging VLAN Stacking......................................................................................................................................768
VLAN Stacking in Multi-Vendor Networks......................................................................................................... 768
VLAN Stacking Packet Drop Precedence................................................................................................................. 772
22
Contents