Setup Guide

Conguration Task List for Privilege Levels.......................................................................................................... 763
RADIUS............................................................................................................................................................................767
RADIUS Authentication........................................................................................................................................... 767
Conguration Task List for RADIUS.......................................................................................................................769
RADIUS-assigned dynamic access control lists................................................................................................... 772
Support for Change of Authorization and Disconnect Messages packets.......................................................777
TACACS+........................................................................................................................................................................788
Conguration Task List for TACACS+................................................................................................................... 788
TACACS+ Remote Authentication.........................................................................................................................790
Command Authorization..........................................................................................................................................791
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................791
Enabling SCP and SSH.................................................................................................................................................. 791
Using SCP with SSH to Copy a Software Image.................................................................................................792
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................793
Conguring When to Re-generate an SSH Key ..................................................................................................793
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 794
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 794
Conguring the HMAC Algorithm for the SSH Client.........................................................................................795
Conguring the SSH Server Cipher List...............................................................................................................796
Conguring the SSH Client Cipher List.................................................................................................................796
Conguring DNS in the SSH Server......................................................................................................................797
Secure Shell Authentication....................................................................................................................................797
Troubleshooting SSH...............................................................................................................................................800
Telnet...............................................................................................................................................................................800
VTY Line and Access-Class Conguration.................................................................................................................800
VTY Line Local Authentication and Authorization...............................................................................................800
VTY Line Remote Authentication and Authorization........................................................................................... 801
VTY MAC-SA Filter Support...................................................................................................................................801
Role-Based Access Control..........................................................................................................................................802
Overview of RBAC.................................................................................................................................................. 802
User Roles................................................................................................................................................................ 805
AAA Authentication and Authorization for Roles................................................................................................ 808
Role Accounting........................................................................................................................................................ 811
Display Information About User Roles.................................................................................................................... 811
Two Factor Authentication (2FA).................................................................................................................................813
Handling Access-Challenge Message....................................................................................................................813
Conguring Challenge Response Authentication for SSHv2..............................................................................813
SMS-OTP Mechanism.............................................................................................................................................814
Conguring the System to Drop Certain ICMP Reply Messages.............................................................................814
Dell EMC Networking OS Security Hardening............................................................................................................816
Dell EMC Networking OS Image Verication........................................................................................................816
Startup Conguration Verication..........................................................................................................................817
Conguring the root User Password......................................................................................................................818
Locking Access to GRUB Interface........................................................................................................................819
Enabling User Lockout for Failed Login Attempts................................................................................................ 819
24
Contents