Administrator Guide

ICMPv6 message types
Who are you request (139)
Who are you reply (140)
Mtrace response (200)
Mtrace messages (201)
NOTE: The Dell Networking OS does not suppress the following ICMPv6 message types:
Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Confirmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing various security
features, security also lies with the integrity of the device. If the software itself is compromised, all of the aforementioned methods
become ineffective.
The Dell EMC Networking OS is enhanced verify whether the startup configuration file is altered before loading. This section explains how
to configure OS image and startup configuration verification.
Startup Configuration Verification
Dell EMC Networking OS comes with startup configuration verification feature. When enabled, it checks the integrity of the startup
configuration that the system uses while the system reboots and loads only if it is intact.
Important Points to Remember
The startup configuration verification feature is disabled by default on the Dell EMC Networking OS.
The feature is supported for startup configuration files stored in the local system only.
The feature is not supported when the fastboot or the warmboot features are enabled on the system.
If the startup configuration verification fails after a reload, the system does not load your startup configuration.
After enabling the startup configuration verification feature, use the verified boot hash command to verify and store the hash
value. If you don’t store the hash value, you cannot reboot the device until you verify the image hash.
Dell EMC Networking OS Behavior after System Power-Cycle
If the system reboots due reasons such as power-cycle, the current startup configuration may be different than the one you verified the
hash using the verified boot hash command. When the system comes up, the system may use the last-verified startup
configuration.
Dell EMC Networking recommends backing up the startup configuration to a safe location after you use the verified boot hash
command. When the startup configuration verification fails, you can restore it from the backup.
836
Security