Administrator Guide
• Packet too big (2)
• Echo request (128)
• Multicast listener query (130)
• Multicast listener report (131)
• Multicast listener done (132)
• Router solicitation (133)
• Router advertisement (134)
• Neighbor solicitation (135)
• Neighbor advertisement (136)
• Redirect (137)
• Router renumbering (138)
• MLD v2 listener report (143)
• Duplicate Address Request (157)
• Duplicate Address Conrmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing various security
features, security also lies with the integrity of the device. If the software itself is compromised, all of the aforementioned methods become
ineective.
The Dell EMC Networking OS is enhanced verify whether the OS image and the startup conguration le are altered before loading. This
section explains how to congure OS image and startup conguration verication.
Dell EMC Networking OS Image Verication
Dell EMC Networking OS comes with the OS image verication and the startup conguration verication features. When enabled, these
features check the integrity of The OS image and the startup conguration that the system uses while the system reboots and loads only if
they are intact.
Important Points to Remember
• The OS image verication feature is disabled by default on the Dell EMC Networking OS.
• The OS image verication feature is supported for images stored in the local system only.
• The OS image verication feature is not supported when the fastboot or the warmboot features are enabled on the system.
• If OS image verication fails after a reload, the system does not load the startup conguration. The System displays an appropriate
error message until the no verified boot command is used on the system.
• After you enable The OS image verication feature, the system prompts you to enter The OS image hash when you upgrade the Dell
EMC Networking OS to a later version. The system checks if your hash matches with The OS image hash only after reloading.
• After enabling The OS image verication feature, use the verified boot hash command to verify and store the hash value. If you
don’t store the hash value, you cannot reboot the device until you verify The OS image hash.
Enabling and Conguring OS Image Hash Verication
To enable and congure Dell EMC Networking OS image hash verication, follow these steps:
1 Enable the OS image hash verication feature.
CONFIGURATION mode
Security
817