Deployment Guide

Table Of Contents
Table 98. Suppressed ICMPv6 message types (continued)
ICMPv6 message types
Who are you reply (140)
Mtrace response (200)
Mtrace messages (201)
NOTE: The Dell Networking OS does not suppress the following ICMPv6 message types:
Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Confirmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing
various security features, security also lies with the integrity of the device. If the software itself is compromised, all of the
aforementioned methods become ineffective.
The Dell EMC Networking OS is enhanced verify whether the startup configuration file is altered before loading. This section
explains how to configure OS image and startup configuration verification.
Startup Configuration Verification
Dell EMC Networking OS comes with startup configuration verification feature. When enabled, it checks the integrity of the
startup configuration that the system uses while the system reboots and loads only if it is intact.
Important Points to Remember
The startup configuration verification feature is disabled by default on the Dell EMC Networking OS.
The feature is supported for startup configuration files stored in the local system only.
The feature is not supported when the fastboot or the warmboot features are enabled on the system.
If the startup configuration verification fails after a reload, the system does not load your startup configuration.
After enabling the startup configuration verification feature, use the verified boot hash command to verify and store
the hash value. If you dont store the hash value, you cannot reboot the device until you verify the image hash.
Dell EMC Networking OS Behavior after System Power-Cycle
If the system reboots due reasons such as power-cycle, the current startup configuration may be different than the one
you verified the hash using the verified boot hash command. When the system comes up, the system may use the
last-verified startup configuration.
Security
875