White Papers

Enabling SCP and SSH.................................................................................................................................................. 781
Using SCP with SSH to Copy a Software Image.................................................................................................782
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................783
Conguring When to Re-generate an SSH Key ..................................................................................................783
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 784
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 784
Conguring the HMAC Algorithm for the SSH Client.........................................................................................785
Conguring the SSH Server Cipher List............................................................................................................... 785
Conguring the SSH Client Cipher List.................................................................................................................786
Secure Shell Authentication................................................................................................................................... 786
Troubleshooting SSH...............................................................................................................................................789
Telnet...............................................................................................................................................................................789
VTY Line and Access-Class Conguration................................................................................................................. 789
VTY Line Local Authentication and Authorization............................................................................................... 790
VTY Line Remote Authentication and Authorization...........................................................................................790
VTY MAC-SA Filter Support................................................................................................................................... 791
Role-Based Access Control...........................................................................................................................................791
Overview of RBAC...................................................................................................................................................792
User Roles.................................................................................................................................................................794
AAA Authentication and Authorization for Roles................................................................................................. 797
Role Accounting.......................................................................................................................................................800
Display Information About User Roles...................................................................................................................800
Two Factor Authentication (2FA)................................................................................................................................ 802
Handling Access-Challenge Message................................................................................................................... 802
Conguring Challenge Response Authentication for SSHv2............................................................................. 802
SMS-OTP Mechanism............................................................................................................................................803
Conguring the System to Drop Certain ICMP Reply Messages............................................................................803
Dell EMC Networking OS Security Hardening...........................................................................................................805
Dell EMC Networking OS Image Verication.......................................................................................................805
Startup Conguration Verication.........................................................................................................................806
Conguring the root User Password..................................................................................................................... 807
Locking Access to GRUB Interface.......................................................................................................................808
Enabling User Lockout for Failed Login Attempts............................................................................................... 808
45 Service Provider Bridging........................................................................................................................ 809
VLAN Stacking...............................................................................................................................................................809
Important Points to Remember.............................................................................................................................. 810
Congure VLAN Stacking....................................................................................................................................... 810
Creating Access and Trunk Ports............................................................................................................................811
Enable VLAN-Stacking for a VLAN........................................................................................................................812
Conguring the Protocol Type Value for the Outer VLAN Tag...........................................................................812
Conguring Dell EMC Networking OS Options for Trunk Ports.........................................................................812
Debugging VLAN Stacking......................................................................................................................................813
VLAN Stacking in Multi-Vendor Networks............................................................................................................814
VLAN Stacking Packet Drop Precedence................................................................................................................... 817
Enabling Drop Eligibility............................................................................................................................................ 817
Contents
25