Administrator Guide

Support for Change of Authorization and Disconnect Messages packets..........................................................735
TACACS+........................................................................................................................................................................... 744
Configuration Task List for TACACS+......................................................................................................................744
TACACS+ Remote Authentication............................................................................................................................746
Command Authorization.............................................................................................................................................746
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................. 747
Enabling SCP and SSH..................................................................................................................................................... 747
Using SCP with SSH to Copy a Software Image.................................................................................................... 748
Removing the RSA Host Keys and Zeroizing Storage ...........................................................................................748
Configuring When to Re-generate an SSH Key ..................................................................................................... 749
Configuring the SSH Server Key Exchange Algorithm...........................................................................................749
Configuring the HMAC Algorithm for the SSH Server...........................................................................................749
Configuring the SSH Server Cipher List...................................................................................................................750
Configuring DNS in the SSH Server......................................................................................................................... 750
Secure Shell Authentication........................................................................................................................................751
Troubleshooting SSH.................................................................................................................................................. 753
Telnet.................................................................................................................................................................................. 753
VTY Line and Access-Class Configuration.....................................................................................................................753
VTY Line Local Authentication and Authorization...................................................................................................754
VTY Line Remote Authentication and Authorization.............................................................................................. 754
VTY MAC-SA Filter Support...................................................................................................................................... 754
Role-Based Access Control............................................................................................................................................. 755
Overview of RBAC......................................................................................................................................................755
User Roles.....................................................................................................................................................................757
AAA Authentication and Authorization for Roles.................................................................................................... 760
Role Accounting...........................................................................................................................................................762
Display Information About User Roles.......................................................................................................................763
Two Factor Authentication (2FA)...................................................................................................................................764
Handling Access-Challenge Message....................................................................................................................... 764
Configuring Challenge Response Authentication for SSHv2.................................................................................764
SMS-OTP Mechanism................................................................................................................................................765
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... 765
SSH Lockout Settings.......................................................................................................................................................767
Dell EMC Networking OS Security Hardening...............................................................................................................767
Dell EMC Networking OS Image Verification...........................................................................................................767
Startup Configuration Verification............................................................................................................................ 768
Configuring the root User Password........................................................................................................................ 769
Locking Access to GRUB Interface...........................................................................................................................769
Enabling User Lockout for Failed Login Attempts...................................................................................................770
48 Service Provider Bridging.........................................................................................................771
VLAN Stacking....................................................................................................................................................................771
Configure VLAN Stacking...........................................................................................................................................772
Creating Access and Trunk Ports..............................................................................................................................773
Enable VLAN-Stacking for a VLAN........................................................................................................................... 773
Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................................773
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 774
Debugging VLAN Stacking......................................................................................................................................... 774
VLAN Stacking in Multi-Vendor Networks...............................................................................................................775
VLAN Stacking Packet Drop Precedence......................................................................................................................778
Contents
23