Administrator Guide

Table Of Contents
Table 103. Suppressed ICMPv6 message types (continued)
ICMPv6 message types
Who are you reply (140)
Mtrace response (200)
Mtrace messages (201)
NOTE: The Dell EMC Networking OS does not suppress the following ICMPv6 message types:
Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Confirmation (158)
SSH Lockout Settings
The system has a SSH protection mechanism which, by default, allows 10 login attempts (success or failure) per minute. After
the 10th attempt, the system blocks the user login for one minute (since the first login attempt) before allowing the next set
of login attempts. With Dell EMC Networking OS version 9.11(0.0), the SSH protection mechanism has been enhanced to allow
60 login attempts (success or failure) per minute. After 60 attempts, the system blocks the user login for a maximum rate
interval which can be specified by the user using the ip ssh connection-rate-interval CLI command. The ip ssh
connection-rate-lockout CLI command ensures a minimum blocking time after the rate limit has been exceeded.
For more information on the commands, please refer the CLI Reference Guide for the respective system.
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing
various security features, security also lies with the integrity of the device. If the software itself is compromised, all of the
aforementioned methods become ineffective.
The Dell EMC Networking OS is enhanced verify whether the OS image and the startup configuration file are altered before
loading. This section explains how to configure OS image and startup configuration verification.
Dell EMC Networking OS Image Verification
Dell EMC Networking OS comes with the OS image verification and the startup configuration verification features. When
enabled, these features check the integrity of The OS image and the startup configuration that the system uses while the
system reboots and loads only if they are intact.
Important Points to Remember
The OS image verification feature is disabled by default on the Dell EMC Networking OS.
Security
795