Administrator Guide

NOTE: The Dell Networking OS does not suppress the ICMP message type echo request (8).
Table 105. Suppressed ICMPv6 message types
ICMPv6 message types
Destination unreachable (1)
Time exceeded (3)
IPv6 header bad (4)
Echo reply (129)
Who are you request (139)
Who are you reply (140)
Mtrace response (200)
Mtrace messages (201)
NOTE: The Dell Networking OS does not suppress the following ICMPv6 message types:
Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Confirmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing
various security features, security also lies with the integrity of the device. If the software itself is compromised, all of the
aforementioned methods become ineffective.
The Dell EMC Networking OS is enhanced verify whether the startup configuration file is altered before loading. This section
explains how to configure OS image and startup configuration verification.
Startup Configuration Verification
Dell EMC Networking OS comes with startup configuration verification feature. When enabled, it checks the integrity of the
startup configuration that the system uses while the system reboots and loads only if it is intact.
Important Points to Remember
The startup configuration verification feature is disabled by default on the Dell EMC Networking OS.
The feature is supported for startup configuration files stored in the local system only.
884
Security