Concept Guide

Conguring the SSH Server Key Exchange Algorithm....................................................................................... 846
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 847
Conguring the SSH Server Cipher List............................................................................................................... 847
Conguring DNS in the SSH Server......................................................................................................................848
Secure Shell Authentication................................................................................................................................... 848
Troubleshooting SSH................................................................................................................................................851
Telnet................................................................................................................................................................................851
VTY Line and Access-Class Conguration..................................................................................................................851
VTY Line Local Authentication and Authorization............................................................................................... 852
VTY Line Remote Authentication and Authorization...........................................................................................852
VTY MAC-SA Filter Support.................................................................................................................................. 853
Role-Based Access Control..........................................................................................................................................853
Overview of RBAC.................................................................................................................................................. 854
User Roles................................................................................................................................................................ 856
AAA Authentication and Authorization for Roles................................................................................................ 859
Role Accounting.......................................................................................................................................................862
Display Information About User Roles...................................................................................................................863
Two Factor Authentication (2FA)................................................................................................................................ 864
Handling Access-Challenge Message................................................................................................................... 864
Conguring Challenge Response Authentication for SSHv2............................................................................. 864
SMS-OTP Mechanism............................................................................................................................................865
Conguring the System to Drop Certain ICMP Reply Messages............................................................................865
SSH Lockout Settings...................................................................................................................................................867
Dell EMC Networking OS Security Hardening........................................................................................................... 867
Dell EMC Networking OS Image Verication....................................................................................................... 867
Startup Conguration Verication.........................................................................................................................868
Conguring the root User Password.....................................................................................................................869
Locking Access to GRUB Interface....................................................................................................................... 870
Enabling User Lockout for Failed Login Attempts................................................................................................870
48 Service Provider Bridging.........................................................................................................................872
VLAN Stacking............................................................................................................................................................... 872
Important Points to Remember..............................................................................................................................873
Congure VLAN Stacking.......................................................................................................................................873
Creating Access and Trunk Ports...........................................................................................................................874
Enable VLAN-Stacking for a VLAN....................................................................................................................... 875
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 875
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 875
Debugging VLAN Stacking..................................................................................................................................... 876
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 876
VLAN Stacking Packet Drop Precedence.................................................................................................................. 880
Enabling Drop Eligibility........................................................................................................................................... 880
Honoring the Incoming DEI Value...........................................................................................................................881
Marking Egress Packets with a DEI Value............................................................................................................ 882
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................882
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................883
Contents
27