White Papers

NOTE: The Dell Networking OS does not suppress the following ICMPv6 message types:
Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Conrmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing various security
features, security also lies with the integrity of the device. If the software itself is compromised, all of the aforementioned methods become
ineective.
The Dell EMC Networking OS is enhanced verify whether the startup conguration le is altered before loading. This section explains how
to congure OS image and startup conguration verication.
Startup Conguration Verication
Dell EMC Networking OS comes with startup conguration verication feature. When enabled, it checks the integrity of the startup
conguration that the system uses while the system reboots and loads only if it is intact.
Important Points to Remember
The startup conguration verication feature is disabled by default on the Dell EMC Networking OS.
The feature is supported for startup conguration les stored in the local system only.
The feature is not supported when the fastboot or the warmboot features are enabled on the system.
If the startup conguration verication fails after a reload, the system does not load your startup conguration.
After enabling the startup conguration verication feature, use the verified boot hash command to verify and store the hash
value. If you don’t store the hash value, you cannot reboot the device until you verify the image hash.
Dell EMC Networking OS Behavior after System Power-Cycle
If the system reboots due reasons such as power-cycle, the current startup conguration may be dierent than the one you veried the
hash using the verified boot hash command. When the system comes up, the system may use the last-veried startup
conguration.
Dell EMC Networking recommends backing up the startup conguration to a safe location after you use the verified boot hash
command. When the startup conguration verication fails, you can restore it from the backup.
Security
925