Concept Guide

Conguring When to Re-generate an SSH Key ..................................................................................................837
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 838
Conguring the HMAC Algorithm for the SSH Server.......................................................................................838
Conguring the HMAC Algorithm for the SSH Client.........................................................................................839
Conguring the SSH Server Cipher List...............................................................................................................839
Conguring the SSH Client Cipher List................................................................................................................ 840
Conguring DNS in the SSH Server..................................................................................................................... 840
Secure Shell Authentication....................................................................................................................................841
Troubleshooting SSH...............................................................................................................................................843
Telnet...............................................................................................................................................................................844
VTY Line and Access-Class Conguration................................................................................................................. 844
VTY Line Local Authentication and Authorization............................................................................................... 844
VTY Line Remote Authentication and Authorization...........................................................................................845
VTY MAC-SA Filter Support.................................................................................................................................. 845
Role-Based Access Control..........................................................................................................................................846
Overview of RBAC.................................................................................................................................................. 846
User Roles.................................................................................................................................................................848
AAA Authentication and Authorization for Roles.................................................................................................852
Role Accounting.......................................................................................................................................................854
Display Information About User Roles...................................................................................................................855
Two Factor Authentication (2FA)................................................................................................................................856
Handling Access-Challenge Message................................................................................................................... 857
Conguring Challenge Response Authentication for SSHv2............................................................................. 857
SMS-OTP Mechanism............................................................................................................................................ 857
Conguring the System to Drop Certain ICMP Reply Messages............................................................................858
Dell EMC Networking OS Security Hardening...........................................................................................................859
Dell EMC Networking OS Image Verication.......................................................................................................859
Startup Conguration Verication..........................................................................................................................861
Conguring the root User Password.....................................................................................................................862
Locking Access to GRUB Interface.......................................................................................................................862
Enabling User Lockout for Failed Login Attempts............................................................................................... 863
48 Service Provider Bridging........................................................................................................................ 864
VLAN Stacking...............................................................................................................................................................864
Important Points to Remember............................................................................................................................. 865
Congure VLAN Stacking.......................................................................................................................................865
Creating Access and Trunk Ports.......................................................................................................................... 866
Enable VLAN-Stacking for a VLAN....................................................................................................................... 867
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 867
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 867
Debugging VLAN Stacking.....................................................................................................................................868
VLAN Stacking in Multi-Vendor Networks...........................................................................................................869
VLAN Stacking Packet Drop Precedence...................................................................................................................872
Enabling Drop Eligibility............................................................................................................................................872
Honoring the Incoming DEI Value.......................................................................................................................... 873
Marking Egress Packets with a DEI Value.............................................................................................................874
Contents
27