White Papers

Table Of Contents
Enabling SCP and SSH..................................................................................................................................................827
Using SCP with SSH to Copy a Software Image.................................................................................................828
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 829
Conguring When to Re-generate an SSH Key ..................................................................................................829
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 830
Conguring the HMAC Algorithm for the SSH Server.......................................................................................830
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 831
Conguring the SSH Server Cipher List................................................................................................................831
Conguring the SSH Client Cipher List................................................................................................................ 832
Secure Shell Authentication................................................................................................................................... 832
Troubleshooting SSH...............................................................................................................................................835
Telnet...............................................................................................................................................................................835
VTY Line and Access-Class Conguration................................................................................................................. 835
VTY Line Local Authentication and Authorization............................................................................................... 836
VTY Line Remote Authentication and Authorization...........................................................................................836
VTY MAC-SA Filter Support...................................................................................................................................837
Role-Based Access Control.......................................................................................................................................... 837
Overview of RBAC.................................................................................................................................................. 838
User Roles................................................................................................................................................................ 840
AAA Authentication and Authorization for Roles.................................................................................................843
Role Accounting.......................................................................................................................................................846
Display Information About User Roles...................................................................................................................846
Two Factor Authentication (2FA)................................................................................................................................ 848
Handling Access-Challenge Message................................................................................................................... 848
Conguring Challenge Response Authentication for SSHv2............................................................................. 848
SMS-OTP Mechanism............................................................................................................................................849
Conguring the System to Drop Certain ICMP Reply Messages............................................................................849
Dell EMC Networking OS Security Hardening............................................................................................................851
Dell EMC Networking OS Image Verication........................................................................................................851
Startup Conguration Verication.........................................................................................................................852
Conguring the root User Password.....................................................................................................................853
Locking Access to GRUB Interface.......................................................................................................................854
Enabling User Lockout for Failed Login Attempts............................................................................................... 854
49 Service Provider Bridging........................................................................................................................ 855
VLAN Stacking...............................................................................................................................................................855
Important Points to Remember............................................................................................................................. 856
Congure VLAN Stacking.......................................................................................................................................856
Creating Access and Trunk Ports...........................................................................................................................857
Enable VLAN-Stacking for a VLAN.......................................................................................................................858
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 858
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................858
Debugging VLAN Stacking.....................................................................................................................................859
VLAN Stacking in Multi-Vendor Networks...........................................................................................................860
VLAN Stacking Packet Drop Precedence.................................................................................................................. 864
Enabling Drop Eligibility........................................................................................................................................... 864
26
Contents