Administrator Guide
Configuring When to Re-generate an SSH Key ..................................................................................................... 746
Configuring the SSH Server Key Exchange Algorithm........................................................................................... 747
Configuring the HMAC Algorithm for the SSH Server........................................................................................... 747
Configuring the HMAC Algorithm for the SSH Client............................................................................................ 748
Configuring the SSH Server Cipher List...................................................................................................................748
Configuring the SSH Client Cipher List.................................................................................................................... 749
Configuring DNS in the SSH Server......................................................................................................................... 749
Secure Shell Authentication....................................................................................................................................... 749
Troubleshooting SSH...................................................................................................................................................751
Telnet.................................................................................................................................................................................. 752
VTY Line and Access-Class Configuration.....................................................................................................................752
VTY Line Local Authentication and Authorization...................................................................................................752
VTY Line Remote Authentication and Authorization.............................................................................................. 753
VTY MAC-SA Filter Support...................................................................................................................................... 753
Role-Based Access Control............................................................................................................................................. 753
Overview of RBAC...................................................................................................................................................... 754
User Roles.................................................................................................................................................................... 756
AAA Authentication and Authorization for Roles.................................................................................................... 759
Role Accounting........................................................................................................................................................... 761
Display Information About User Roles.......................................................................................................................762
Two Factor Authentication (2FA)...................................................................................................................................763
Handling Access-Challenge Message....................................................................................................................... 763
Configuring Challenge Response Authentication for SSHv2.................................................................................763
SMS-OTP Mechanism................................................................................................................................................764
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... 764
Dell EMC Networking OS Security Hardening.............................................................................................................. 765
Dell EMC Networking OS Image Verification...........................................................................................................766
Startup Configuration Verification............................................................................................................................ 766
Configuring the root User Password.........................................................................................................................767
Locking Access to GRUB Interface...........................................................................................................................768
Enabling User Lockout for Failed Login Attempts...................................................................................................768
48 Service Provider Bridging........................................................................................................ 769
VLAN Stacking...................................................................................................................................................................769
Configure VLAN Stacking...........................................................................................................................................770
Creating Access and Trunk Ports...............................................................................................................................771
Enable VLAN-Stacking for a VLAN............................................................................................................................771
Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................................772
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 772
Debugging VLAN Stacking......................................................................................................................................... 773
VLAN Stacking in Multi-Vendor Networks...............................................................................................................773
VLAN Stacking Packet Drop Precedence......................................................................................................................776
Enabling Drop Eligibility............................................................................................................................................... 776
Honoring the Incoming DEI Value.............................................................................................................................. 777
Marking Egress Packets with a DEI Value................................................................................................................777
Dynamic Mode CoS for VLAN Stacking.........................................................................................................................778
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................... 779
Layer 2 Protocol Tunneling...............................................................................................................................................779
Enabling Layer 2 Protocol Tunneling..........................................................................................................................781
Specifying a Destination MAC Address for BPDUs................................................................................................ 782
Contents
23










