Administrator Guide

Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Conrmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing various security
features, security also lies with the integrity of the device. If the software itself is compromised, all of the aforementioned methods become
ineective.
The Dell EMC Networking OS is enhanced verify whether the OS image and the startup conguration le are altered before loading. This
section explains how to congure OS image and startup conguration verication.
Dell EMC Networking OS Image Verication
Dell EMC Networking OS comes with the OS image verication and the startup conguration verication features. When enabled, these
features check the integrity of The OS image and the startup conguration that the system uses while the system reboots and loads only if
they are intact.
Important Points to Remember
The OS image verication feature is disabled by default on the Dell EMC Networking OS.
The OS image verication feature is supported for images stored in the local system only.
The OS image verication feature is not supported when the fastboot or the warmboot features are enabled on the system.
If OS image verication fails after a reload, the system does not load the startup conguration. The System displays an appropriate
error message until the no verified boot command is used on the system.
After you enable The OS image verication feature, the system prompts you to enter The OS image hash when you upgrade the Dell
EMC Networking OS to a later version. The system checks if your hash matches with The OS image hash only after reloading.
After enabling The OS image verication feature, use the verified boot hash command to verify and store the hash value. If you
don’t store the hash value, you cannot reboot the device until you verify The OS image hash.
Enabling and Conguring OS Image Hash Verication
To enable and congure Dell EMC Networking OS image hash verication, follow these steps:
1 Enable the OS image hash verication feature.
CONFIGURATION mode
Security
817